Government - Page 60
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Two Virginia schools on Tuesday will launch a $6.5 million project to help sort out the myriad legal, technical and policy challenges involved in steeling the nation's most vital computer systems against cyberattacks. The Critical Infrastructure Protection Project - to . . .
Canada's electronic spy agency is coming out of the shadows for its biggest recruitment campaign since the Cold War. The clandestine Communications Security Establishment expects to expand its workforce of cyber-spies and high-tech whizzes by at least one-third over the next 18 months, a surge of unprecedented growth for the agency whose roots stretch back to the Second World War. . . .
The private sector manages more than 85 percent of the nation's critical infrastructure and must therefore collaborate with the government to protect those resources, officials said at a Senate hearing last week. . . .
The private sector manages more than 85 percent of the nation's critical infrastructure and must therefore collaborate with the government to protect those resources, according to government and industry leaders speaking at a May 8 Senate Governmental Affairs Committee hearing. . . .
Computer criminals would face increased penalties, and Internet users would face greater surveillance by access providers, under a bill approved Wednesday by a House of Representatives panel.. . .
The CERT Coordination Center at Pennsylvania's Carnegie Mellon University has developed two unique pilot programs designed to bolster the information assurance capabilities of government agencies. . . .
A month after getting permission to reconnect some of its sites to the Internet, the Interior Department's Minerals Management Service is back in the hot seat. MMS has once again caught the attention of court-appointed Special Master Alan Balaran for . . .
Four years ago the record industry and some technology companies banded together to match wits in a combined effort to stamp out Internet music piracy. Their goal: to usher in an age of secure digital songs wrapped in unbreakable code.. . .
Security agents from both sides of the Atlantic are being sent to school so they can trace and prosecute computer criminals. The FBI, U.S. Customs, the High Technology Crime Investigation Association, Europol and the U.K.'s National High-Tech Crime Unit are among the agencies that have sent staff to learn about cybercrime, fraud, hacking and software bugs, according to the company, Massachusetts-based QinetiQ Trusted Information Management. . . .
New amendments to Hungary's laws on internet crime have drawn criticism from industry players for not distinguishing enough between minor and major crimes. "The law is strict in places it shouldn't be so strict," said Dániel Nemes, CEO of internet firm telnet Hungary Rt, highlighting the fact that the amendments to Hungary's Criminal Code, which are effective from April 1, outlaw any attempt at hacking, even if no damage is caused.. . .
Prompted by last year's terrorist attacks, momentum is building on Capitol Hill to expand the role of the National Institute of Standards and Technology in establishing IT security standards and best practices. But the prospect is raising concerns in some circles. . . .
Security consultants and technicians see a windfall from the Bush Administration's interest in securing the country's physical and digital borders, but it may take years to see the results. . . .
Speaking before a conference of hundreds of federal technology personnel and industry officials Wednesday morning, Richard Clarke, President Bush's point man on national cybersecurity, outlined the next phase in the controversial plan to build an impenetrable information network for the federal government, known as Govnet. . . .
Information from databases, such as names of terrorism suspects, fingerprints, photographs and biographical data, should be regularly available to a wider range of law enforcement agencies, Ashcroft said. However, the directive, issued April 11, deals primarily with developing policies, guidelines and . . .
The UK Ministry of Defence (MoD) says it is "checking" claims that one of its documents - detailing a step-by-step guide on how to build an atomic bomb - has been put in a public office for all to see. . . .
Esther Dyson famously argued that as the world will never be perfect, whether online or offline, it is foolish to expect higher standards on the Internet than we accept in `real life'. Legislators are now turning this argument round, and arguing that they have to restrict traditional offline freedoms in order to enable the regulation of cyberspace.. . .
Some computer security professionals are already feeling the pinch from a new Defense Department policy discouraging contractors from hiring non-citizens. The Pentagon says it's about loyalty; visa holders call it classic xenophobia. . . .
The FBI runs major risks of having its information systems infiltrated despite the agency's recent overhaul efforts, top FBI officials said Tuesday. After the capture of Robert Hanssen, who worked at the FBI for more than 20 years while spying for . . .
The speed at which critical national functions are being moved online increases the risk of vulnerability, say former CIA and NSA security experts in exclusive interviews with Computerworld. While cyberterrorism may not be an immediate threat, it would be foolish not to recognize that the U.S. is facing a "thinking enemy" who will adapt to attack our critical infrastructures and vulnerabilities. . .
Most large corporations and government agencies have been attacked by computer hackers, but more often and more frequently they do not inform authorities of the breaches, an FBI survey finds. . . .