Cybersecurity

TSA Losing Body Scanner Debate

It looks like the debate over full body scanners -- called a virtual strip search by some airline passengers -- may be moving against the Transportation Security Administration, as this <a href=http://www.usatoday.com/travel/flights/2010-07-13-1Abodyscans13_ST_N.htm?csp=hf>USA Today story</a>.

Cybersecurity

DHS told to increase control over border-fence contractors

U.S. Customs and Border Protection must improve how it oversees contractors hired to build an IT-enabled, security fence along the U.S. border with Mexico, an audit finds.

Cybersecurity

Internet Filtering Gaining Traction?

Australia is in the midst of a heated debate over blocking websites citizens can view. The controversial ban has been postponed for a year -- conveniently after the country's elections -- so that an independent review board could determine exactly what controversial websites should be banned. Internet Service Providers have already agreed to block access to certain sites known for posting child pornography.

Cybersecurity

Trusted IDs face fearful response

The government's proposed identity ecosystem instills as much fear, uncertainty and doubt as hope for easier and more secure online transactions.

Cybersecurity

DHS to take FISMA lead

The Office of Management and Budget and the White House Cybersecurity Coordinator have outlined for agencies the various cybersecurity responsibilities of the Homeland Security Department.

Cybersecurity

Malware Campaign Morphs

Last month, a major malware campaign attempting to trick users into opening malicious PDF files was <a href="http://www.computerworld.com/s/article/9176088/Major_malware_campaign_abuses_unfixed_PDF_flaw?taxonomyId=208">reported</a>. The attack worked by sending a malicious e-mail masquerading as mail from company system administrators and contained the subject message heading "setting for your mailbox are changed." The malware exploited an unpatched design flaw in the PDF format.

Cybersecurity

Russian spy ring: IT was not enough

The recently busted Russian spy ring won't win any awards for the most innovative use of advanced technology.

Cybersecurity

White House officially hands cyber oversight to DHS

Memo outlining cybersecurity duties seen as a response to Congress' call for better compliance with security law.

Cybersecurity

DHS still pondering biometric air exit system

The Homeland Security Department is still considering whether -- and how -- to proceed with a system to electronically collect fingerprints from non-U.S. visitors as they leave the United States by aircraft.

Cybersecurity

Be a Good Security Analyst

How deep is your <a href="http://www.it.ufl.edu/policies/security/uf-it-sec-incident-response.html">incident and response tracking</a>? There are a number of ways to track and log incidents. I recommend keeping copies of any relevant logs in an incident entry notebook. Every virus detection goes into this incident database, including malware incident details and usually the website access logs within the context of the antivirus incident.

Cybersecurity

U.S. nuke agency announces new data, physical security controls

Officials at the National Nuclear Security Administration say the policies should balance efficiency and safety.

Cybersecurity

Official calls securing critical infrastructure against cyberattack impractical

An Energy intelligence official says utilities and companies operating major industries cannot afford to check all technology products for vulnerabilities.

Cybersecurity

Federal IT and Labor Cuts

Nextgov's Emily Long published a <a href="http://www.nextgov.com/nextgov/ng_20100706_9903.php?oref=rss">complete look</a> of the federal government's transition to continuous monitoring today. I'm pointing to the story not because it was done by the news organization I blog for, but because it's the best recap I've seen.

Cybersecurity

U.S. cybersecurity R&D needs a master plan

Cybersecurity research and development programs from agencies and industry need to be better coordinated, according to the Government Accountability Office.

Cybersecurity

Bill includes porn-blocking technology for federal networks

A House amendment to the supplemental spending bill requires funds spent on computer systems to include anti-pornography filtering software.

Cybersecurity

Cybersecurity R&D efforts lack direction, leadership

Administration should develop detailed agenda and improve its oversight role, watchdog says.

Cybersecurity

What Agency Do You Trust the Most?

The public again ranked the U.S. Postal Service as the most trusted agency in protecting personal information, according to a <a href=http://www.ponemon.org/news-2/32>study released by the Ponemon Institute</a> this month. The postal service held that honor in 2009 as well. The Federal Trade Commission and the Internal Revenue Service came in No. 2 and No. 3, respectively, followed by the National Institutes of Health and the Veterans Affairs Department.