Cybersecurity
Photo of the Day
Yes, that's Sen. Tom Carper, D-Del., chairman of the Federal Financial Management, Government Information, Federal Services and International Security Subcommittee and <a href=http://techinsider.nextgov.com/2010/04/critical_agency_cyber_reports_prod_senate_action.php>author of cybersecurity bills</a>, standing next to a Nerf gun "modified to hold long-range antennas and a computer that can monitor data sent over wireless networks."
Cybersecurity
Back to school: Meet NIST's leader for national cybersecurity education
Federal Computer Week spoke today with Ernest McDuffie, who is leading the National Institute of Standards and Technology's coordination of the National Initiative for Cybersecurity Education.
Cybersecurity
Could WikiLeaks set back information sharing?
Former CIA director Michael Hayden says the recent posting of classified material about the war in Afghanistan exposes the risks of information sharing among intelligence agencies. But the government’s use of IT could be a bigger threat to personal privacy.
Cybersecurity
Cyber Command still struggling to define cyber war
The Cyber Command is charged with conducting and defending against cyber warfare, but we don’t really know what we’re doing yet in cyberspace, says former CIA director Gen. Michael Hayden.
Cybersecurity
Get a Pay Raise
If you haven't yet completed the 2010 <a href="http://www.surveymethods.com/EndUser.aspx?CDE9859FCC869F96CD">Salary Survey</a>, this weekend may be your last opportunity. Some very interesting data is already emerging, and it may be helpful to many of you when it comes to negotiating salaries and bonuses.
Cybersecurity
Pentagon mulls plan for NSA to monitor Defense contractors' network traffic
The Defense and Homeland Security departments are considering a plan that would allow the National Security Agency to monitor certain Defense contractors' networks for malicious activity, according a report posted by The Atlantic Web site.
Cybersecurity
SSH Brute Force Spotted
New reports are filtering in to SANS' Internet Storm Center about a new SSH brute force script, possibly named "dd_ssh."
Cybersecurity
Soundbytes: Defense official changes, NII good-bye and downsizing government
A weekly roundup of comments from Nextgov.com. All comments are presented in their original, unedited form.
Cybersecurity
A National Lab's 5 Tips for Better Security
Roger Johnston, a member of the vulnerability assessment team at the <a href="http://www.anl.gov/index.html">Argonne National Laboratory</a> near Chicago, delivered a keynote on Wednesday at the <a href=http://www.usenix.org/events/sec10/tech/>USENIX security conference</a> in Washington.
Cybersecurity
US-VISIT tests of limited value, GAO finds
The Homeland Security Department should incorporate more than the results of two recent pilot programs to decide whether and how to pursue a biometric-based air exit system for non-U.S. citizens.
Cybersecurity
Kill the Catch Phrase
Deloitte pushed out a press release Tuesday on recently being named the "best iconic and overall structure" winner for the 2010 National Cybersecurity Awareness Challenge. But is it newsworthy?
Cybersecurity
FCC charts 'Cybersecurity Roadmap' with public's help
The Federal Communications Commission wants public feedback as it develops its plan for cybersecurity.
Cybersecurity
Cyber's Big Business
For Maryland, cybersecurity pays. The state's governor, Martin O'Malley, wrote on Monday in a <a href=http://www.washingtonpost.com/wp-dyn/content/article/2010/08/06/AR2010080605935.html>commentary</a> appearing in the Washington Post's business publication, Capital Business, "Maryland is better positioned than other states to recover from the national recession stronger and sooner."
Cybersecurity
Infosec Lawyers at a Premium
For many unwelcome reasons, information technology security professionals need lawyers, but it's not always easy to find one that understands the nature of intricate infosec topics. In fact, many security practitioners report that the vast majority of lawyers they encounter are intimidated by computers. The question arises: Is there a kind of lawyer or law firm that focuses solely on infosec topics?
Cybersecurity
Hackfest revisited: It's getting scary out there
Cell phones, bank ATMs and power grids were just some of the devices and critical infrastructure shown to be vulnerable to hackers' prying and manipulation at recent security conferences.
Cybersecurity