Cybersecurity
Obama Can't Turn Off the Internet
The sweeping cybersecurity bill from Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, and Tom Carper, D-Del., has come under unfounded fire for giving government the authority to shut down Internet services during emergencies. For the life of me, I can't find where it says this in <a href="http://thomas.loc.gov/cgi-bin/query/z?c111:S.+3480:">the bill</a>.
Cybersecurity
Better security requires changes not in technologies, but in user practices
A recent trip to Haiti reminded blogger John Klossner about the sisyphean task agencies face in trying to secure their networks.
Cybersecurity
Committee approves cybersecurity bill
Homeland Security and Governmental Affairs Committee has sent a cybersecurity bill to the full Senate.
Cybersecurity
Lieberman-Collins cybersecurity bill clears Senate committee
The Senate Homeland Security and Governmental Affairs Committee voted on Thursday to approve a sweeping cybersecurity bill that would clarify the authority of the president to take critical information technology systems offline during emergencies when no other option is available.
Cybersecurity
Security-cleared job seekers have new social network
The Cleared Network gives people with security clearances a chance to take advantage of social networking's perks.
Cybersecurity
iPad Security Solutions
Earlier this month, Apple's iPad 3G suffered a <a href="http://www.nextgov.com/web_headlines/wh_20100614_1207.php">major breach</a> that possibly exposed thousands of high profile email addresses. The news made <a href="http://cybersecurityreport.nextgov.com/2010/06/feds_caught_up_in_ipad_security_breach.php">major headlines</a>, and the FBI opened an <a href="http://online.wsj.com/article/SB10001424052748704312104575299111189853840.html">investigation</a>.
Cybersecurity
Report: Billions for Securing the Smart Grid
There have been numerous reports on lost of spending on cybersecurity. All those IT initiatives the White House is pushing require secure pathways and storage -- including the smart grid. According to a recently released <a href="http://www.pikeresearch.com/newsroom/smart-grid-cyber-security-market-to-reach-3-7-billion-by-2015">report from Pike Research</a>, a market research and consulting firm for green technology, the market for securing the smart grid will top $3.7 billion by 2015, or about 15 percent of total smart grid capital investment during the next five years.
Cybersecurity
Auditors rap ICE over strategic management missteps
The Homeland Security Department's inspector general tells the Immigrations and Customs and Enforcement to finalize an IT strategic plan and establish a comprehensive agencywide IT budget process.
Cybersecurity
Meet the FBI's new top cyber cop
Gordon Snow talks about the challenges of cyber counterintelligence and the FBI’s role in federal cybersecurity efforts.
Cybersecurity
20 critical security controls your organization should focus on
Consensus Audit Guidelines identify 20 security controls that enterprises cannot afford to ignore.
Cybersecurity
Just how continuous should continuous security monitoring be?
It's common knowledge that organizations should regularly assess their security readiness. But how often should they scan their security assets and system configurations?
Cybersecurity
Novel cybersecurity approach has plenty of fans—and naysayers
The Consensus Audit Guidelines are supposed to help agencies fix cybersecurity by focusing on the most dangerous threats first. But critics say the voluntary measures are redundant -- or worse.
Cybersecurity
Widgets, Twitter to fuel FEMA emergency alerts
The Federal Emergency Management Agency has created 11 widgets and 13 Twitter feeds as part of its arsenal of social media tools aimed at disaster preparedness and response.
Cybersecurity
Bill Puts Contractors Out of Work?
For the past couple months I've written about <a href="http://cybersecurityreport.nextgov.com/2010/04/white_house_heroes.php">continuous monitoring</a>, its <a href="http://www.nextgov.com/nextgov/ng_20100421_5175.php">importance</a> and the <a href="http://cybersecurityreport.nextgov.com/2010/04/state_dept_success_revealed.php">steps</a> that must be taken to change the security culture in Washington. Today we are a lot closer to breaking down barriers and implementing near-real-time situational awareness. But there are still things slowing down the transition aside from the Federal Information Security Management Act (FISMA). Sometimes the best way to find out about those barriers is to sift through the written testimonies submitted to Congress.
Cybersecurity
White House plans strategy for better cyber authentication
White House Cyber Coordinator Howard Schmidt says the Obama administration will release a draft of its national strategy to improve the identification of people and systems in cyberspace.
Cybersecurity
The Growing Business of Privacy
Privacy is becoming big business, <a href=http://online.wsj.com/article/SB10001424052748703438604575315182025721578.html?mod=WSJ_Tech_LEFTTopNews>reportsM</a> <em>The Wall Street Journal</em>. Privacy flubs by AT&T, Facebook, Apple Inc. seem to have fanned the interest.
Cybersecurity