Cybersecurity

Lessons From A Software Revolution

There are a lot of bad stories out there about government failure when it comes to cybersecurity. They certainly serve a purpose, and in many respects, they note the truthful fact that the U.S. has largely failed in its attempt to secure its computing infrastructure. But there also are good stories floating around. The one I'm going to tell shows how the U.S. Air Force stepped up to the plate long ago, even before the Navy, which I've praised in earlier posts.

Cybersecurity

DHS would be cyber power center under Lieberman/Collins proposal

Three senior senators have introduced legislation to bolster the Homeland Security Department's role in protecting the country's networks and systems from cyber threats.

Cybersecurity

Step Forward For Cyber Policy

The 2010 Protecting Cyberspace as a National Asset Act came out of the Senate Subcommittee on Federal Financial Management today, giving cybersecurity policy another push toward President Obama's desk.

Cybersecurity

Bill: President could order companies to deploy security fixes

If the government believes private networks that operate the nation's critical infrastructure are threatened, then companies could be required to follow specific security measures.

Cybersecurity

Feds Caught Up in iPad Breach

A security breach in Apple's iPad has exposed the personal information of some top government officials as well as celebrities, according to an <a href=http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed>article</a> on gawker.com

Cybersecurity

No Such Thing As Secure?

Linda Cureton, chief information officer at NASA, has news for you: Believing that policies, programs and technologies create a secure cyber environment does not automatically make it so.

Cybersecurity

DHS network policy puts systems at risk, IG finds

The Homeland Security Department is working to fix security vulnerabilities to its enterprise application domain identified in a new report from the department's inspector general.

Cybersecurity

Growth in Competitions

One of the many reasons to partake in a cybersecurity competition is to learn and grow a skill set. Threats and vulnerabilities change daily, so the more education the better. In fact, at SANS, we constantly are challenging our instructors to prove their knowledge is up to date. The minute they aren't the authority on a given topic, they no longer are invited to teach. But perhaps one of the most important reasons to engage in competitions is to quell your inner hacker. It's not much fun to have a skill set and not use it, and often, finding avenues to use it in a productive and legal way can be a challenge in itself.

Cybersecurity

TSA now handling watch list checks for all domestic flights

The Transportation Security Administration has finished taking over from airlines the responsibility of screening all passengers that are flying inside the United States against the government's terrorist watch lists, as part of the Secure Flight program.

Cybersecurity

FTC On Photocopier Security

More for our continuing feature on the ever-expanding number of devices that present a security hole. (Past items <a href=<a href=http://cybersecurityreport.nextgov.com/2010/05/a_cyberattack_with_that_latte.php>here</a> and <a href=http://cybersecurityreport.nextgov.com/2010/05/hackers_will_soon_want_your_car.php>here</a>.) This month: photocopiers. From IDG News Service:

Cybersecurity

James Cameron, Kevin Costner bring Hollywood know-how to gulf oil spill

'Avatar' and 'Titanic' director James Cameron and 'Waterworld' star Kevin Costner are working with oil giant BP and government officials on separate remedies for the Gulf oil spill disaster.

Cybersecurity

Loose networks sink ships

Fierce Government IT

Cybersecurity

New worries emerge about Internet monitoring

The prospect of private-sector participation in the the government's latest Einstein 3 Internet monitoring and cyber defense system, even if voluntary, has raised questions about privacy and the technology's supposed superiority over tools that companies might already be using.

Cybersecurity

Pass-the-Hash

In many ways, the advancement of hacking has truly come to the fore. Attack vectors are coalescing, evolving and advancing the breadth and scope of their impact. There's no better example of this than the pass-the-hash technique, considered by security expert Ed Skoudis to be one of 2010's most dangerous attack vectors.

Cybersecurity

Panel to recommend certifications for cybersecurity workforce

New report from nonpartisan commission will suggest the federal government establish a certifying body to test skills of potential hires.

Cybersecurity

CIOs Push New Software Settings

Two members of the <a href="http://www.cio.gov/">CIO council</a> have proposed baseline candidate settings for Windows 7 and Internet Explorer 8, an attempt to implement and secure new software without compromising existing security settings.

Cybersecurity

Is It Enough?

The U.S. cyber craze recently celebrated its first birthday. Jim Garrettson over at The New New Internet <a href=http://www.thenewnewinternet.com/2010/06/01/cybersecurity-a-year-in-review>points out</a> that the nation -- and the Obama administration -- in the past year have come a long way in addressing cyber threats and boosting security across government.

Cybersecurity

New DOD cyber commander seeks better situational awareness

Army Gen. Keith Alexander says the Defense Department needs a common, real-time, understanding of what's happening across its many computer networks.

Cybersecurity

Cyber policy snared in legislative tangle

Cybersecurity remains a more pressing concern among experts than lawmakers, who have 35 cyber-related proposals and counting weaving their way through the legislative process.