Cybersecurity
Lessons From A Software Revolution
There are a lot of bad stories out there about government failure when it comes to cybersecurity. They certainly serve a purpose, and in many respects, they note the truthful fact that the U.S. has largely failed in its attempt to secure its computing infrastructure. But there also are good stories floating around. The one I'm going to tell shows how the U.S. Air Force stepped up to the plate long ago, even before the Navy, which I've praised in earlier posts.
Cybersecurity
DHS would be cyber power center under Lieberman/Collins proposal
Three senior senators have introduced legislation to bolster the Homeland Security Department's role in protecting the country's networks and systems from cyber threats.
Cybersecurity
Step Forward For Cyber Policy
The 2010 Protecting Cyberspace as a National Asset Act came out of the Senate Subcommittee on Federal Financial Management today, giving cybersecurity policy another push toward President Obama's desk.
Cybersecurity
Bill: President could order companies to deploy security fixes
If the government believes private networks that operate the nation's critical infrastructure are threatened, then companies could be required to follow specific security measures.
Cybersecurity
Feds Caught Up in iPad Breach
A security breach in Apple's iPad has exposed the personal information of some top government officials as well as celebrities, according to an <a href=http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed>article</a> on gawker.com
Cybersecurity
No Such Thing As Secure?
Linda Cureton, chief information officer at NASA, has news for you: Believing that policies, programs and technologies create a secure cyber environment does not automatically make it so.
Cybersecurity
DHS network policy puts systems at risk, IG finds
The Homeland Security Department is working to fix security vulnerabilities to its enterprise application domain identified in a new report from the department's inspector general.
Cybersecurity
Growth in Competitions
One of the many reasons to partake in a cybersecurity competition is to learn and grow a skill set. Threats and vulnerabilities change daily, so the more education the better. In fact, at SANS, we constantly are challenging our instructors to prove their knowledge is up to date. The minute they aren't the authority on a given topic, they no longer are invited to teach. But perhaps one of the most important reasons to engage in competitions is to quell your inner hacker. It's not much fun to have a skill set and not use it, and often, finding avenues to use it in a productive and legal way can be a challenge in itself.
Cybersecurity
TSA now handling watch list checks for all domestic flights
The Transportation Security Administration has finished taking over from airlines the responsibility of screening all passengers that are flying inside the United States against the government's terrorist watch lists, as part of the Secure Flight program.
Cybersecurity
FTC On Photocopier Security
More for our continuing feature on the ever-expanding number of devices that present a security hole. (Past items <a href=<a href=http://cybersecurityreport.nextgov.com/2010/05/a_cyberattack_with_that_latte.php>here</a> and <a href=http://cybersecurityreport.nextgov.com/2010/05/hackers_will_soon_want_your_car.php>here</a>.) This month: photocopiers. From IDG News Service:
Cybersecurity
James Cameron, Kevin Costner bring Hollywood know-how to gulf oil spill
'Avatar' and 'Titanic' director James Cameron and 'Waterworld' star Kevin Costner are working with oil giant BP and government officials on separate remedies for the Gulf oil spill disaster.
Cybersecurity
New worries emerge about Internet monitoring
The prospect of private-sector participation in the the government's latest Einstein 3 Internet monitoring and cyber defense system, even if voluntary, has raised questions about privacy and the technology's supposed superiority over tools that companies might already be using.
Cybersecurity
Pass-the-Hash
In many ways, the advancement of hacking has truly come to the fore. Attack vectors are coalescing, evolving and advancing the breadth and scope of their impact. There's no better example of this than the pass-the-hash technique, considered by security expert Ed Skoudis to be one of 2010's most dangerous attack vectors.
Cybersecurity
Panel to recommend certifications for cybersecurity workforce
New report from nonpartisan commission will suggest the federal government establish a certifying body to test skills of potential hires.
Cybersecurity
CIOs Push New Software Settings
Two members of the <a href="http://www.cio.gov/">CIO council</a> have proposed baseline candidate settings for Windows 7 and Internet Explorer 8, an attempt to implement and secure new software without compromising existing security settings.
Cybersecurity
Is It Enough?
The U.S. cyber craze recently celebrated its first birthday. Jim Garrettson over at The New New Internet <a href=http://www.thenewnewinternet.com/2010/06/01/cybersecurity-a-year-in-review>points out</a> that the nation -- and the Obama administration -- in the past year have come a long way in addressing cyber threats and boosting security across government.
Cybersecurity
New DOD cyber commander seeks better situational awareness
Army Gen. Keith Alexander says the Defense Department needs a common, real-time, understanding of what's happening across its many computer networks.
Cybersecurity