Government - Page 45
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This document is one of a series of security standards and guidelines being developed by NIST's Computer Security Division in response to the Federal Information Security Management Act of 2002. For additional information, please visit the NIST Security Certification and Accreditation . . .
The California Supreme Court ruled Monday that a Web publisher could be barred from posting DVD-copying code online without infringing on his free speech rights.. . .
As the Department of Homeland Security prepares to name a leader for its National Cyber Security Division, observers in Washington and the private sector say DHS' hiring process has set up the new NCSD head to fail. . .
The computer system used by U.S. immigration officers to check terrorist watchlists has been on the blink for much of the past week, and technicians dispatched by the Homeland Security Department cannot seem to diagnose the problem, let alone fix it, . . .
The government's plan to pressure software vendors to build more secure products seems to be gathering a bit of momentum. A major part of the National Strategy to Secure Cyberspace, the idea involves using market pressures and the government's purchasing power . . .
A centralized early warning system for Internet security alerts should be working by this fall, an official from the U.S. Department of Homeland Security said Thursday afternoon. Marcus Sachs, the department's cyber program director, said the system will provide an . . .
UK government IT security is "worryingly poor" and needs significant improvement, according to research by a security testing firm. NTA Monitor said that almost half of the government IT systems it examined had more than 10 vulnerabilities which "exposed them . . .
The Defense Department must do more to guard against cyber threats, said Robert Lentz, the department's director of information assurance. "As our dependence on information networks increases, it creates new vulnerabilities, as adversaries develop new ways of attacking and disrupting . . .
Three computer researchers from the Information Security Institute at Johns Hopkins University, with help from a computer scientist at Rice University, say they've uncovered vulnerabilities in the software purportedly used by Diebold Election Systems. As a result, one person can cast . . .
The U.S. Department of Defense (DOD) relies too much on commercial software, doesn't know who is creating the software, and faces other significant cybersecurity problems, witnesses told a U.S. House of Representatives subcommittee Thursday. The U.S. military's use of commercial, off-the-shelf . . .
US citizens will be issued with "smart" passports carrying a digitally signed photograph by late 2004. Frank Moss, deputy assistant secretary for Passport Services at the US Department of State, says the first digital passports will be issued in the . . .
The intelligence unit of the four-month-old Department of Homeland Security is understaffed, unorganized and weak-willed in bureaucratic struggles with other government agencies, diminishing its role in pursuing terrorists, according to some members of Congress and independent national security experts. . .
Former White House cyber-security czar Richard Clarke ripped his former employer Tuesday, saying that the government is doing an unacceptable job of helping the private sector lock down the nation's critical infrastructure. . .
Businesses will get legal guidelines this year on how to secure their pieces of cyberspace, but lawmakers aren't giving details yet. Forthcoming cybersecurity legislation will be "meaningful regulatory approach to securing private-sector critical infrastructure" says Representative Adam Putnam (R-Florida), who . . .
Lawmakers are getting less subtle with their demands that vendors and network operators do everything possible to make the nation's cyber-infrastructure secure. Even legislation dictating IT security requirements--regarded as a last resort--is in the works and slated for introduction by year's . . .
This is the last article in a four-part series looking at U.S. information security laws and the way those laws affect the work of security professionals. This installment continues the discussion of information security in the public sector and provides an . . .
A new national cybersecurity research center, funded by the Office of Naval Research, will be led by the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign. The National Center for Advanced Secure Systems Research (NCASSR) will . . .
The next version of the Internet Protocol, which provides a 128-bit standard to transmit data, is getting a jump-start for adoption with its endorsement by the Department of Defense. The result: A boost in the number of available Internet addresses, to . . .
The atmosphere in the new U.S. Department of Homeland Security (DHS) is one of chaotic energy, akin to a "dot com," but the new agency will need a more business-like approach to successfully fight terrorism, according to Robert Liscouski, Assistant Secretary . . .
Members of a House panel expressed frustration Tuesday over the progress of federal agencies in securing their IT systems. Agency heads and other officials responded by saying progress was being made but significant problems remain. The purpose of the hearing . . .