Government - Page 46

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

OPM Speeds Hiring of Cyber Specialists

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

All executive branch agencies are free to hire their own information technology professionals to bolster the security of their information systems, the Office of Personnel Management has announced. The agency notified agency heads and chief human capital officers of the . . .

N/MCI Security Doubts Persist

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The need for a more secure network infrastructure was one of the driving forces behind the U.S. Navy's quest to build the $6.9 billion Navy/Marine Corps Intranet. But with only a few months left before the majority of N/MCI seats are . . .

The Feds Love Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

deepquest submits, The term "open source" may sound like an invitation to be hacked, but Linux is often more secure than proprietary systems. In defense and security, the attitude is that if the code can't be seen, it can't be trusted--it could be riddled with bugs, loopholes and hidden backdoors. But technological diversity lowers the risk of cyber-attacks on widely deployed systems.. . .

As threats rise, feds shelter their IT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

These are the times that try the souls of government security managers. The threat of cyberattacks on government systems is escalating as computers become ever more interconnected, use of the Internet increases, and attack technology becomes ever more sophisticated and . . .

Homeland security industry group is launched

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

An industry group has been created to connect private-sector companies with the Department of Homeland Security. Executives of the new Homeland Security Business Executive Council announced the launch of the nonpartisan, nonprofit group today in Washington. . . .

DOD Moving to IPv6

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Beginning in October, all Defense Department assets acquired for the Global Information Grid must be compatible with the next-generation Internet Protocol Version 6 (IPv6), according to DOD's top information technology official. . .

Homeland Security official has bogus computer degrees

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Following news reports that a senior official at the Homeland Security Department appears to have obtained her academic degrees from an unaccredited diploma mill, several members of Congress are seeking to learn how background checks and security clearances failed to flag . . .

Bill would let spamees sue spammers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A pair of unusual political allies, a left-wing Democrat and a conservative religious group, teamed up on Thursday in Washington's latest bid to rid the Internet of spam. Sen. Chuck Schumer of New York joined with the Christian Coalition to . . .

Fighting Spam By Any Means Necessary

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Federal Trade Commission has put spam at the top of its hit list and wants congressional leaders to help bolster its fight against the pesky, costly junk e-mail that floods the in-boxes of consumers and businesses alike. The commission . . .

E-authentication gains ground in agencies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Agencies slowly are warming up to using electronic signatures and other forms of electronic verification as a part of their everyday business. The Treasury Department is piloting a smart-card program for electronic and physical access, CIO Drew Ladner said last . . .

Cybercorps grads aim to boost federal IT security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IT security at federal agencies will get a boost this month from the first class of 46 students, mostly midcareer IT professionals, who have completed training under a federal scholarship-for-service program. Cybercorps, as the program is called, was created in . . .

Ridge Creates New Division to Combat Cyber Threats

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Department of Homeland Security (DHS) in implementing the President's National Strategy to Secure Cyberspace and the Homeland Security Act of 2002, has created the National Cyber Security Division (NCSD) under the Department's Information Analysis and Infrastructure Protection Directorate. The NCSD . . .

Security holds its ground in IT crime survey

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The eighth annual IT crime survey by the Computer Security Institute of San Francisco and that city's FBI's computer intrusion squad shows a dramatic drop in financial losses caused by computer attacks. And a former chief of the FBI's cybercrime squad . . .

States Skirt Internet Tax Ban

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At least 18 states have found a way to collect taxes on Internet access, despite a federal law that bans the practice. Tax authorities in Alabama, Florida and Kentucky are assessing sales taxes on the amount consumers pay for high-speed digital subscriber line Internet service, commonly referred to as DSL.. . .

DOD to Re-emphasize Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The secretary of Defense will soon issue a directive placing a renewed emphasis on operational security (OPSEC) throughout the department. Tom Mauriello, director of the interagency OPSEC support staff, said a document has been awaiting DOD Secretary Donald Rumsfeld's signature . . .

Governments Demands May Derail Cybercrime Unit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A European agency designed to combat cybercrime may not be up and running as planned because of the level of monitoring wanted by member countries. Plans for a European agency to tackle cybercrime such as computer viruses and terror attacks . . .

IRS Rife With Security Weaknesses

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Critical information security weaknesses at the Internal Revenue Service demonstrate the importance of moving past the development of an information security program to actually implement the measures outlined in the plan. . .

Too Much Cyber Security at CIA

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While other government agencies struggle with their cyber security practices, the Central Intelligence Agency apparently suffers from the opposite problem: too much security -- according to a recent study of the agency's use of information technology. . .

Feds to Open Cyber-Security Ops Center

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ty Bodell submits Officials at the Department of Homeland Security plan to announce this week the establishment of a national cyber-security center, which brings all the department's information security assets under one umbrella, according to people briefed on the . . .