Cybersecurity
TSA Losing Body Scanner Debate
It looks like the debate over full body scanners -- called a virtual strip search by some airline passengers -- may be moving against the Transportation Security Administration, as this <a href=http://www.usatoday.com/travel/flights/2010-07-13-1Abodyscans13_ST_N.htm?csp=hf>USA Today story</a>.
Cybersecurity
DHS told to increase control over border-fence contractors
U.S. Customs and Border Protection must improve how it oversees contractors hired to build an IT-enabled, security fence along the U.S. border with Mexico, an audit finds.
Cybersecurity
Internet Filtering Gaining Traction?
Australia is in the midst of a heated debate over blocking websites citizens can view. The controversial ban has been postponed for a year -- conveniently after the country's elections -- so that an independent review board could determine exactly what controversial websites should be banned. Internet Service Providers have already agreed to block access to certain sites known for posting child pornography.
Cybersecurity
Trusted IDs face fearful response
The government's proposed identity ecosystem instills as much fear, uncertainty and doubt as hope for easier and more secure online transactions.
Cybersecurity
DHS to take FISMA lead
The Office of Management and Budget and the White House Cybersecurity Coordinator have outlined for agencies the various cybersecurity responsibilities of the Homeland Security Department.
Cybersecurity
Malware Campaign Morphs
Last month, a major malware campaign attempting to trick users into opening malicious PDF files was <a href="http://www.computerworld.com/s/article/9176088/Major_malware_campaign_abuses_unfixed_PDF_flaw?taxonomyId=208">reported</a>. The attack worked by sending a malicious e-mail masquerading as mail from company system administrators and contained the subject message heading "setting for your mailbox are changed." The malware exploited an unpatched design flaw in the PDF format.
Cybersecurity
Russian spy ring: IT was not enough
The recently busted Russian spy ring won't win any awards for the most innovative use of advanced technology.
Cybersecurity
White House officially hands cyber oversight to DHS
Memo outlining cybersecurity duties seen as a response to Congress' call for better compliance with security law.
Cybersecurity
DHS still pondering biometric air exit system
The Homeland Security Department is still considering whether -- and how -- to proceed with a system to electronically collect fingerprints from non-U.S. visitors as they leave the United States by aircraft.
Cybersecurity
Be a Good Security Analyst
How deep is your <a href="http://www.it.ufl.edu/policies/security/uf-it-sec-incident-response.html">incident and response tracking</a>? There are a number of ways to track and log incidents. I recommend keeping copies of any relevant logs in an incident entry notebook. Every virus detection goes into this incident database, including malware incident details and usually the website access logs within the context of the antivirus incident.
Cybersecurity
U.S. nuke agency announces new data, physical security controls
Officials at the National Nuclear Security Administration say the policies should balance efficiency and safety.
Cybersecurity
Official calls securing critical infrastructure against cyberattack impractical
An Energy intelligence official says utilities and companies operating major industries cannot afford to check all technology products for vulnerabilities.
Cybersecurity
Federal IT and Labor Cuts
Nextgov's Emily Long published a <a href="http://www.nextgov.com/nextgov/ng_20100706_9903.php?oref=rss">complete look</a> of the federal government's transition to continuous monitoring today. I'm pointing to the story not because it was done by the news organization I blog for, but because it's the best recap I've seen.
Cybersecurity
U.S. cybersecurity R&D needs a master plan
Cybersecurity research and development programs from agencies and industry need to be better coordinated, according to the Government Accountability Office.
Cybersecurity
Bill includes porn-blocking technology for federal networks
A House amendment to the supplemental spending bill requires funds spent on computer systems to include anti-pornography filtering software.
Cybersecurity
Cybersecurity R&D efforts lack direction, leadership
Administration should develop detailed agenda and improve its oversight role, watchdog says.
Cybersecurity