Government - Page 58

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

U.S. Cyber-Security Efforts Faulted

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Years after orders from the White House to beef up the security of the nation's most important computer systems, the government is having trouble identifying which organizations should be involved and how they should be coordinated, according to a new report. . . .

Senate Stops P2P, So Should You

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Until last week, the staff of the United States Senate was demonstrating that the people who create our legislation don't think they have to obey it themselves. The Senate, which is now crafting legislation that would further restrict the illegal sharing. . .

OMB puts hold on homeland IT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Office of Management and Budget today put on hold -- pending an expedited review by an interagency board -- all planned information technology investments above $500,000 at the major agencies that would be moving to the Homeland Security Department under . . .

Group Proposes PC Protection Guarantees

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Several U.S. government agencies have teamed with an international Internet security organization to support a set of benchmarks aimed at guaranteeing a minimum security standard for computers. The National Security Agency, the Defense Information Systems Agency and the National Institute of. . .

National Strategy for Protecting Cyberspace due Sept. 11

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The President's Critical Infrastructure Board plans to release its National Strategy for Defending Cyberspace Sept. 11 in the Silicon Valley, board chairman Richard Clarke said. The document, which will outline a broad agenda for protecting national and global information resources, will. . .

Alliance Sets Standards on Computer Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a high-tech, high-powered version of a neighborhood watch, a group of government agencies and private businesses plan to announce today a common set of standards and software to fight computer hacking. The Pentagon, the National Security Agency, the National Institute. . .

Government devises computer security application; broad use expected

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Most recent attacks were written and released by bored youngsters testing their skills, but the government is becoming more concerned about organized attacks against federal computers from terrorists or foreign governments. Several government agencies have had their own security standards for some time. What is new about Wednesday's announcement is that the various agencies have agreed on a single standard - a difficult task that occurred about three months ago.. . .

FDIC faulted for weak IT security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A federal agency created in the 1930s to help restore economic confidence during the Great Depression isn't winning the confidence of a congressional watchdog agency for its information security practices. Many end users had access to "powerful" systems commands, including 26 . . .

House OKs life sentences for hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

By a 385-3 vote, the House approved a computer crime bill that also expands police ability to conduct Internet or telephone eavesdropping without first obtaining a court order. The Bush administration had asked Congress to approve the Cyber Security Enhancement . . .

White House Reviews Security Backbone

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The White House budget office said on Friday it was setting up a review board to assess the technology needs of the proposed Department of Homeland Security. "This new department should have one world-class infrastructure, and on the books right now . . .

Pakistan Government Looks to the Linux Users Group

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Technology Resource Mobilization Unit pursues GNU/Linux as a means of reducing software piracy. It must be quite flattering when a government sits up, takes note of the potential of a Linux-users group, and prominently features it in advertisements noticed nationwide. . .

Uncle Sam's Info-Tech Crisis

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government needs to stay focused on first rescuing data trapped in older systems and then establishing the basic framework for widespread search and communications functions. Exotic, automated intelligence forays would be gravy atop such basic achievements, which by themselves would . . .

Homeland defense focus shifts to tech

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer security is becoming an increasingly critical part of President Bush's proposal for a homeland defense department. When Bush formally proposed the department last month, he predicted that the future agency would aid in investigating Al Qaeda and thwarting disasters . . .

Bush Security Could Get Privacy Czar

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

President Bush's proposed Department of Homeland Security is likely to get its own privacy czar. A panel in the House of Representatives is scheduled to vote this week on a plan to add a chief privacy officer to the planned agency. . .

Much Ado About Nothing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Forget any new laws canning spam and don't expect Uncle Sam to step in and protect your privacy. When it comes to technology, Congress is aggressively doing very little this year. . .

Cyber-Security Is Underplayed, Industry Says

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Among the more contentious questions to arise from President Bush's proposal last month for a Department of Homeland Security is one it did not explicitly address: How should the government deal with threats in cyberspace? Bush proposed merging various agencies, scattered . . .

National Security is an IT Concern

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We can't rely any longer on the comforting urban legend that the Internet is impervious to attack. The Internet is a massive collection of remotely accessible, often poorly maintained networks supported by software systems with little diversity and a history of . . .

Federal IT Integration Takes Shape

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mandating an XML messaging format, the integration allowed for the transfer of remote program and financial information from one database to another, where batch information is verified and balanced, said Negron. Even though these two divisions had already been sharing information . . .

DOD Tests Biometrics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Defense Department's Biometrics Fusion Center soon will begin testing software on four types of biometric devices for use on its Common Access smart cards. DOD's Biometrics Management Office last week awarded a $915,000 contract to KPMG Consulting Inc. of . . .