Government - Page 43

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Q&A: A two-pronged approach to cybersecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The head of the US government's cybersecurity programme explains why he feels that the public and private sectors are making progress towards achieving security Against a backdrop of new challenges from increasingly sophisticated hackers, Yoran is responsible for preparing the government's . . .

A Case of Internet Security Anxiety

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This was the message from yesterday's National Cyber Security Summit in Santa Clara, Calif. The summit, backed by technology trade groups and the U.S. Chamber of Commerce, brought together power players from the tech industry and high-ranking officials from the Department . . .

US challenges IT industry on cybersecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Speaking to more than 300 IT executives at the first National Cyber Security Summit in California, Ridge said everything from electricity grids to banking transactions and telecommunications depends on secure, reliable cyber networks, and terrorist groups "know, as do we, that . . .

Tech Executives Try to Slow Government rules For Computer Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Technology executives are trying to convince the Homeland Security Department that costly new computer security rules aren't needed, arguing their companies are already taking aggressive steps to defend against hackers. The behind-the-scenes lobbying is paying dividends. The administration is reconsidering . . .

Tech industry aims to stem security rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

America's largest technology companies are working to persuade the Department of Homeland Security against consideration of costly new computer-security rules, arguing that companies already are taking aggressive steps to defend against hackers. So far, industry has found a receptive audience. Homeland . . .

Bush pushes for cybercrime treaty

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Even though the United States is a nonvoting member of the Council of Europe, it has pressed hard for the cybercrime treaty as a way to establish international criminal standards related to copyright infringement, online fraud, child pornography and network intrusions. . . .

US Congress' role in IT security debated

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A U.S. House of Representatives member proposed last Thursday that the U.S. Congress require every computer to have antivirus software installed, but IT security experts disagreed with that suggestion and other ways for the government to encourage cybersecurity among private companies . . .

NIST releases security controls proposal

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Institute for Standards and Technology today released the first draft of a publication describing mandated security controls for federal information systems. NIST officials want agencies to experiment with the initial public draft, "Special Publication 800-53: Recommended Security Controls for Federal Information Systems.". . .

E-authentication architecture due in December

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Look for draft architecture by mid-December to replace the original concept of a gateway to secure agencies' electronic transactions, the person overseeing the administration's E-Authentication initiative said this week. Officials recently convened a technology advisory council to look at the state . . .

U.S. Gov't Plans Internet Security Ads

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Consumers who ignore advice about how to protect themselves against hackers, viruses and fraudsters online will soon find it harder to tune out thanks to a nationwide media blitz being crafted by the Department of Homeland Security and a group of . . .

US corporate security disclosure plan won't help

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In an effort to shore up the security of the US' critical infrastructures, the secretary of the Department of Homeland Security recently proposed that all publicly-traded companies disclose in their filings with the Securities and Exchange Commission precisely what they are . . .

Spies Attack White House Secrecy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's a "total meltdown" in America's intelligence services -- and the Bush administration's penchant for secrecy is one of the major reasons why, current and former top U.S. spooks charged Tuesday. George W. Bush's White House has pushed like few . . .

Defense Department To Boost RFID Adoption

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Department of Defense issued a mandate early this month requiring all of its suppliers to use passive RFID tags on the cases and pallets they deliver to its various branches by January 2005. The Defense Department isn't the first to require that suppliers support RFID--Wal-Mart Stores Inc. has told its top 100 suppliers to use RFID tags on cases and pallets by the same date and will require all its suppliers to use the technology in 2006.. . .

Security: A Federal Case

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The department of energy has done something unusual for a federal agency. It has become an example of excellent cyber-security practice. It has done this by pressuring Oracle to elevate security in its 9i database product--in the process, taking software out . . .