Cybersecurity

A Cyberattack With That Latte?

Researchers at the University of Calgary have a new security threat they want you to know about. Typhoid adware.

Cybersecurity

Mitigation, not prohibition, is best response to social media’s security risks

Policy, training and technology can help agencies deal with their concerns about the security of social networking, writes David Etue, vice president of products and markets at Fidelis Security Systems.

Cybersecurity

DHS official stresses cybersecurity is industry's responsibility

Richard Marshall tells contractors 'I have a right to sue you' if a product fails to protect federal networks.

Cybersecurity

Security Common Sense Lost

The <a href="http://www.auscert.org.au/">Australian Computer Emergency Response Team</a> last week held a security conference that is making <a href="http://news.cnet.com/insecurity-complex/?tag=rb_content;overviewHead">headlines</a> for the wrong reasons. Apparently, organizers allowed IBM to hand out USB keys to conference participants, some of which contained malware. <a href="http://beastorbuddha.com/2010/05/21/ibm-letter-to-auscert-delegates-free-malware-giveaway/">Oh, the irony</a>.

Cybersecurity

NASA's new FISMA approach and what it means for you

Jerry Davis, NASA's deputy CIO for IT security, discusses his agency's break from the paper-based process used to measure IT security.

Cybersecurity

Recommended reading

Cameras or cops?; Getting public input on technology projects; The Steve Jobs approach to PowerPoint.

Cybersecurity

Former GSA commissioner wins public service award

The American Council for Technology has presented its most prestigious honor, the John J. Franke Award for public service to former GSA commissioner Jim Williams.

Cybersecurity

FISMA Has To Change

And then there were two. <a href="http://www.nextgov.com/nextgov/ng_20100519_6677.php?oref=topnews">NASA</a> suspended its C&A activity for existing systems, joining the State Department in pushing forward continuous monitoring and starting what might become a domino effect. But is it right for individual agencies to be setting the tone like this? Moreover, if each agency pushes forward with <a href="http://cybersecurityreport.nextgov.com/2010/04/white_house_heroes.php">OMB's CyberScope</a> initiatives and an interpretation on how they relate to FISMA, will the country benefit from multiple models, or will it suffer from fractured leadership?

Cybersecurity

Director of national intelligence and intell sharing to step down

The country's top intelligence official, who oversees programs to integrate intelligence agencies' information technology, is leaving the post.

Cybersecurity

C&A Now Weightless at NASA

Neil Armstrong said it best when he touched the moon's surface for the first time: "One small step for man, one giant leap for mankind." Here we are over 40 years later, and NASA is <a href="http://www.nextgov.com/nextgov/ng_20100519_6677.php?oref=topstory">setting the tone</a> all over again--in cybersecurity.

Cybersecurity

Coast Guard biometrics put brakes on illegal immigration

Tougher policies, new biometric technology and interagency cooperation have helped reduce the number of migrants from the Dominican Republic who are interdicted by the Coast Guard.

Cybersecurity

VA to secure 50,000 networked medical devices

The Veterans Affairs Department is making a special push to isolate and secure its 50,000 online medical devices this year, said CIO Roger Baker.

Cybersecurity

House panel approves bipartisan bill to overhaul cybersecurity

Measure aims to bolster defenses against attacks that have grown in number and intensity.

Cybersecurity

Microsoft to give governments heads up on security vulnerabilities

Microsoft will begin a pilot program this summer to give some government organizations access to technical data on security vulnerabilities before the data is publicly available.

Cybersecurity

Commerce Department opens a public discussion on private data

The Commerce Department's interest in Internet privacy regulations adds a new player to an old debate over rules for how companies handle people's personal data.

Cybersecurity

Before You Pay, Pray

An interesting but confused (to put it nicely) <a href="http://finance.yahoo.com/banking-budgetingk/article/109549/could-online-hackers-steal-your-cash">article</a> covering online banking prompted a pretty saucy <a href="http://righteousit.wordpress.com/2010/05/17/not-news-is-bad-news/">response</a> from an industry expert Monday.

Cybersecurity

VA IT official defends work on data protection

Roger Baker, assistant secretary for information and technology at the Veterans Affairs Department, tells a House panel about work to prevent more data breaches.

Cybersecurity

If McGruff can't handle this alone, who will be the lead dog?

Many people have no idea how to protect themselves against growing cyber threats, including identity theft. With leadership from the Obama White House -- and the help of a McGruff-like figure -- we can forge a national campaign that includes students, employees and Internet providers.