Cybersecurity

Obama Can't Turn Off the Internet

The sweeping cybersecurity bill from Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, and Tom Carper, D-Del., has come under unfounded fire for giving government the authority to shut down Internet services during emergencies. For the life of me, I can't find where it says this in <a href="http://thomas.loc.gov/cgi-bin/query/z?c111:S.+3480:">the bill</a>.

Cybersecurity

Better security requires changes not in technologies, but in user practices

A recent trip to Haiti reminded blogger John Klossner about the sisyphean task agencies face in trying to secure their networks.

Cybersecurity

Committee approves cybersecurity bill

Homeland Security and Governmental Affairs Committee has sent a cybersecurity bill to the full Senate.

Cybersecurity

Lieberman-Collins cybersecurity bill clears Senate committee

The Senate Homeland Security and Governmental Affairs Committee voted on Thursday to approve a sweeping cybersecurity bill that would clarify the authority of the president to take critical information technology systems offline during emergencies when no other option is available.

Cybersecurity

Security-cleared job seekers have new social network

The Cleared Network gives people with security clearances a chance to take advantage of social networking's perks.

Cybersecurity

iPad Security Solutions

Earlier this month, Apple's iPad 3G suffered a <a href="http://www.nextgov.com/web_headlines/wh_20100614_1207.php">major breach</a> that possibly exposed thousands of high profile email addresses. The news made <a href="http://cybersecurityreport.nextgov.com/2010/06/feds_caught_up_in_ipad_security_breach.php">major headlines</a>, and the FBI opened an <a href="http://online.wsj.com/article/SB10001424052748704312104575299111189853840.html">investigation</a>.

Cybersecurity

Report: Billions for Securing the Smart Grid

There have been numerous reports on lost of spending on cybersecurity. All those IT initiatives the White House is pushing require secure pathways and storage -- including the smart grid. According to a recently released <a href="http://www.pikeresearch.com/newsroom/smart-grid-cyber-security-market-to-reach-3-7-billion-by-2015">report from Pike Research</a>, a market research and consulting firm for green technology, the market for securing the smart grid will top $3.7 billion by 2015, or about 15 percent of total smart grid capital investment during the next five years.

Cybersecurity

Auditors rap ICE over strategic management missteps

The Homeland Security Department's inspector general tells the Immigrations and Customs and Enforcement to finalize an IT strategic plan and establish a comprehensive agencywide IT budget process.

Cybersecurity

Meet the FBI's new top cyber cop

Gordon Snow talks about the challenges of cyber counterintelligence and the FBI’s role in federal cybersecurity efforts.

Cybersecurity

20 critical security controls your organization should focus on

Consensus Audit Guidelines identify 20 security controls that enterprises cannot afford to ignore.

Cybersecurity

Just how continuous should continuous security monitoring be?

It's common knowledge that organizations should regularly assess their security readiness. But how often should they scan their security assets and system configurations?

Cybersecurity

Novel cybersecurity approach has plenty of fans—and naysayers

The Consensus Audit Guidelines are supposed to help agencies fix cybersecurity by focusing on the most dangerous threats first. But critics say the voluntary measures are redundant -- or worse.

Cybersecurity

Widgets, Twitter to fuel FEMA emergency alerts

The Federal Emergency Management Agency has created 11 widgets and 13 Twitter feeds as part of its arsenal of social media tools aimed at disaster preparedness and response.

Cybersecurity

Bill Puts Contractors Out of Work?

For the past couple months I've written about <a href="http://cybersecurityreport.nextgov.com/2010/04/white_house_heroes.php">continuous monitoring</a>, its <a href="http://www.nextgov.com/nextgov/ng_20100421_5175.php">importance</a> and the <a href="http://cybersecurityreport.nextgov.com/2010/04/state_dept_success_revealed.php">steps</a> that must be taken to change the security culture in Washington. Today we are a lot closer to breaking down barriers and implementing near-real-time situational awareness. But there are still things slowing down the transition aside from the Federal Information Security Management Act (FISMA). Sometimes the best way to find out about those barriers is to sift through the written testimonies submitted to Congress.

Cybersecurity

White House plans strategy for better cyber authentication

White House Cyber Coordinator Howard Schmidt says the Obama administration will release a draft of its national strategy to improve the identification of people and systems in cyberspace.

Cybersecurity

The Growing Business of Privacy

Privacy is becoming big business, <a href=http://online.wsj.com/article/SB10001424052748703438604575315182025721578.html?mod=WSJ_Tech_LEFTTopNews>reportsM</a> <em>The Wall Street Journal</em>. Privacy flubs by AT&T, Facebook, Apple Inc. seem to have fanned the interest.

Cybersecurity

Wanted: A better system for intelligence collection

The Intelligence Advanced Research Projects Activity's Smart Collection office wants to fund research into ways to make collected intelligence more valuable.