Cybersecurity
FCC Building Cyber Certification
The Federal Communications Commission wants communications services providers to take a more serious approach to cybersecurity and is building a voluntary program to certify companies' practices.
Cybersecurity
US, Russia kick off talks on IT
Officials from the United States and Russia meet this week on a range of information technology-related topics.
Cybersecurity
Feds Failing File Transfer Test
Federal agencies are concerned about securely moving data from one system to another, but employees still are using unsafe transfer methods and leaving systems open to threats, according to a new <a href=http://www.meritalk.com/2010-ftpsecurityreport.php>survey</a>[registration required] from Meritalk and Axway, a security solutions provider.
Cybersecurity
A House insider's view of U.S. cybersecurity policy
Rep. Yvette Clarke, the chairwoman of House Homeland Security subcommittee on Emerging Threats and Cybersecurity, discusses the difficulty of legislating an issue that constantly changes.
Cybersecurity
3 stages of identity consolidation
These are the building blocks and the capabilities that result from a consolidated identity management system.
Cybersecurity
6 ways unified identity management pays off
The benefits associated with implementing a unified identity system include security, compliance and interoperability.
Cybersecurity
Access granted: NIH opens doors to medical resources
In March, the National Institutes of Health became the first government agency to accept two types of industry-standard online identity credentials that people can get for free.
Cybersecurity
Consolidating access control yields big payoffs
Centralizing formerly separate user identity management systems can lower costs, increase security and productivity, and lay the foundation for new online services.
Cybersecurity
World leaders crowd source solutions to global security
A European think tank issues 10 recommendations collected during a five-day online dialogue that included thousands of international experts, government policymakers and activists.
Cybersecurity
Making Dashboards Meaningful
Agencies are boosting transparency online, but making data meaningful is the real trick.
Cybersecurity
Recommended reading
NASA's new research network; DHS' version of the tricorder; finding the payback in the details.
Cybersecurity
Bill would set requirements for cyber coordinator
Senior House lawmakers want the Senate to approve presidential picks to head up a White House cyberspace office.
Cybersecurity
Computers and Stock Market Mayhem
In a span of <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/05/06/AR2010050604545.html?hpid=topnews">5 minutes</a> yesterday, the Dow Jones index tumbled faster than ever before. <a href="http://voices.washingtonpost.com/economy-watch/2010/05/lesson_of_todays_stock_market.html?hpid=topnews">The culprit</a>? It's still unclear, but it appears as if computer issues played an integral part alongside the economic crisis in Greece and the oil spill in the Gulf of Mexico. The point of emphasis here is that computers have become so embedded in our financial institutions that it's not even considered unreasonable to hypothesize the massive financial ramifications of a simple data entry error. The event's shock and awe almost demands that we consider how a cybersecurity breach could have a similar, if not far worse, impact.
Cybersecurity
Big Brother is watching in high definition
The Homeland Security Department is testing out a new 360-degree video surveillance system at Logan International Airport in Boston that is described as offering high-resolution imaging and analytics without the distortion of the typical fisheye lens.
Cybersecurity
Cybersecurity bill would penalize agencies for noncompliance
The Executive Cyberspace Authorities Act would require a review of cyber threats and proof of adherence to FISMA when submitting annual budgets.
Cybersecurity
Cybersecurity failings defy answers
Readers share their theories about why cybersecurity is so lousy in the federal government.
Cybersecurity
Blogger Spotlight: TSA's Blogger Bob
Curtis 'Bob' Burns brings subject-matter expertise and a sense of humor to the Transportation Security Administration blog.
Cybersecurity