Government - Page 68

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Security expert: Tighter measures needed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A noted computer security expert told a Senate subcommittee Monday that the Internet is steadily becoming a more dangerous place, and traditional computer security measures simply don't work. Bruce Schneier, chief technical officer of Counterpane Internet Security Inc. and an expert . . .

Uncle Sam wants a few good hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We're from the government and we want you to help us. That was the message that from a seven-member "Meet the Fed" panel, where government officials answered the questions of a roomful of hackers at the Def Con conference here . . .

Internet too complex to secure, says exec

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When he goes to Washington, D.C. next week to testify before the U.S. Congress on computer and Internet security, Bruce Schneier, the CTO of Counterpane Internet Security, would like to tell them that such efforts are currently done poorly and with the wrong goals.. . .

Davis revives cyberthreat bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rep. Tom Davis (R-Va.) reintroduced July 10 a bill aimed at encouraging the private sector to share cybersecurity incidents with federal agencies so the government has a better picture of threats to national security. Davis and co-sponsor Rep. Jim Moran . . .

U.S. military backs open-source security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Continuing its support of open-source operating systems, the U.S. Department of Defense granted $1.2 million to a community project aimed at adding advanced security features to FreeBSD, an open-source variant of Unix. NAI Labs, the advanced research group of security-software . . .

U.S. scrutinizes security hole at privacy site

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

U.S. officials scrambled to assure businesses Friday that their confidential data had not been compromised by a government Web site that allegedly contained security holes. Ironically, the Web site encouraged businesses to sign up for a program that would beef . . .

US Government admits security blunder

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The US Department of Commerce has taken down part of its official website amid fears that sensitive data from companies including Microsoft, Intel and HP has been compromised. The ironically named Safe Harbour website had two key features removed for "security . . .

'Secure' U.S. Site Wasn't Very

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A U.S. government website devoted to helping businesses keep sensitive information private instead revealed confidential information about American firms. A Commerce Department privacy website exposed proprietary information -- such as revenue, number of employees, and the European countries with which . . .

Max Vision begins 18-month term

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer security consultant and confessed cyber intruder Max Butler will serve out his 18-month prison term at the privately-run Taft Correctional Institution in central California, sources say. Butler, known as 'Max Vision' to friends and associates, pleaded guilty last September to . . .

Government, military scramble for encryption technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government and military are investing more heavily in encryption technology as a defence against hackers who are beginning to deploy more sophisticated cracking techniques. That's the conclusion of a study by industry analysts Frost & Sullivan who said sales of . . .

U.S. is losing ground on IT security, witnesses tell Hill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cybersecurity is slipping, a panel of experts last month told lawmakers at a hearing of the Joint Economic Committee. The biggest threat is cyberwarfare sponsored by foreign governments, said Lawrence K. Gershwin, the national intelligence officer for science and technology for . . .

Canada securing e-government

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Canada, which already has the most advanced electronic government in the world, has hired a Texas company to help develop the enhanced privacy and security features needed for the nation's expanding online government services. By 2004, the Canadian government wants . . .

DOD to use GSA digital certificates

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Defense Department intends by the end of this year to use the General Services Administration's governmentwide digital certificates to authenticate electronic trans.actions with many of its contractors and outside partners. In 1999, DOD awarded its own contract to create the . . .

Security Solution Providers Divided Over Microsoft Ruling

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

From a security perspective, the ruling is positive, says Joel Scambray, managing principal at Foundstone, an Irvine, Calif.-based security-services firm. "I think forcing a company to become distracted with these legal proceedings and the prospect of a breakup is never going to be good for security," he says. "Microsoft has got to do its homework on security, and taking them to court doesn't help them do that. Taking this off their docket will help them focus on what they should be doing.". . .

New standard set for security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Commerce Department has formally approved the new standard for the minimum level of cryptography in federal security products, replacing a standard that had been in effect for seven years. With the approval June 27, security products used by agencies for . . .

U.S. Agencies Say E-Signature Law Is Doing the Job

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. Federal Trade Commission (FTC) and the Department of Commerce released a report Wednesday recommending that Congress take no action to amend the digital signature law, also known as the Electronic Signature in Global & National Commerce Act (ESIGN), which . . .

CIA: Attacks Aren't Predictable

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The CIA cannot predict computer attacks on U.S. systems before they happen, as the agency is expected to do with political and military events, a top CIA official told Congress on Thursday. Despite a major increase in intelligence efforts dedicated to . . .

Global treaty--threat to the Net?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"In a nutshell, it will strangle the Internet with a suffocating blanket of overlapping jurisdictional claims, expose every Web page publisher to liabilities for libel, defamation and other speech offenses from virtually any country, (and) effectively strip Internet service providers of . . .

How the FBI Investigates Computer Crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This guide provides information about the federal investigative and prosecutive process for computer related crimes. It will help you understand some of the guidelines, policies, and resources used by the Federal Bureau of Investigation (FBI) when it investigates computer crime.. . .