Federal

69dafe8b58066478aea48f3d0f384820

NIST Revision Expands Government Authentication Options

December 16, 2011 Added by:Headlines

“Changes made to the document reflect changes in the state of the art. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare Part III - Still More Questions from .GOV

December 13, 2011 Added by:Don Eijndhoven

As for cyber warfare, there are various internationally accepted legal frameworks and that can provide some help. Consider the Law of Armed Conflict or Universal Human Rights, both of which have received wide adoption and have led to increased cooperation among nation states...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

What Facebook’s FTC Settlement Means for Businesses

December 01, 2011 Added by:Kelly Colgan

The basic concept is actually quite simple: Companies should include privacy concepts and controls into new products and services during their development stage rather than treating privacy as an afterthought or ignoring it altogether...

Comments  (1)

21d6c9b1539821f5afbd3d8ce5d96380

GovCloud.com: New Hub for Government Cloud Computing

November 28, 2011 Added by:Kevin L. Jackson

GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Officials Deny Hack of Illinois Water Systems

November 23, 2011 Added by:Headlines

While news that there was not a systems breach at the facility is certainly welcome, the conclusions of ICS-CERT and the FBI fail to provide an explanation as to why the Illinois Statewide Terrorism and Intelligence Center initially believed the facility had been compromised...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

ICS-CERT and FBI Statements on Water System Attacks

November 22, 2011 Added by:Headlines

ICS-CERT has not received any additional reports of impacted manufacturers of ICS or other ICS related stakeholders related to these events... any information about possible impacts to additional entities, it will disseminate timely mitigation information as it becomes available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Defense Cyberspace Policy Report

November 18, 2011 Added by:Headlines

"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DARPA Advocates Improved Cyber Offense Capabilities

November 07, 2011 Added by:Headlines

"We are shifting our investments to activities that promise more convergence with the threat and that recognize the needs of the DoD. Malicious cyber attacks are not merely an existential threat to our bits and bytes. They are a real threat to our physical systems..."

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

UK Security Strategy

November 02, 2011 Added by:Mark Gardner

I know things change at a rapid pace in It and Security but, as a Security Professional and a UK taxpayer, why the constant writing of strategies. Surely the best defense for the UK is to actually not give the details of what the government is proposing to do?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Building a Backdoor

October 29, 2011 Added by:Joel Harding

A friend in another country wrote and asked me if the reason the United States suspected foreign equipment of containing a means of gaining surreptitious access to telecommunication, information or networked systems, commonly called a backdoor, was because the US routinely does it...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

The Economic Benefit of Cloud Computing

October 24, 2011 Added by:Kevin L. Jackson

In considering cloud computing for the Intelligence Community, security is an obvious concern. Classified information should always be processed in properly protected and certified IC private or community clouds. If a secure cloud model can be designed, economic savings can certainly be realized...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Anonymous, SCADA, Lulz, DHS, and Motivations

October 18, 2011 Added by:Infosec Island Admin

The motivations of DHS have also been called into question by some. This is especially prescient since they take pains to say that the Anonymous movement “most likely” does not have the technical means and motive to really pull of these types of attacks on the infrastructure. So why even bother?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Investment to Focus on Utility Control Systems

October 18, 2011 Added by:Headlines

“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

SEC to Enterprises: Account for Cybersecurity

October 14, 2011 Added by:Chris Blask

On October 13 the Securities and Exchange Commission (SEC) released CF Disclosure Guidance: Topic No. 2. This document establishes requirements for public companies to account for the cost of cybersecurity incidents and defenses, as well as to disclose their cyber risk mitigation plans to investors...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »