Cybersecurity

FCC Building Cyber Certification

The Federal Communications Commission wants communications services providers to take a more serious approach to cybersecurity and is building a voluntary program to certify companies' practices.

Cybersecurity

US, Russia kick off talks on IT

Officials from the United States and Russia meet this week on a range of information technology-related topics.

Cybersecurity

Cybersecurity buzz could be a bubble

Washington Technology

Cybersecurity

Feds Failing File Transfer Test

Federal agencies are concerned about securely moving data from one system to another, but employees still are using unsafe transfer methods and leaving systems open to threats, according to a new <a href=http://www.meritalk.com/2010-ftpsecurityreport.php>survey</a>[registration required] from Meritalk and Axway, a security solutions provider.

Cybersecurity

A House insider's view of U.S. cybersecurity policy

Rep. Yvette Clarke, the chairwoman of House Homeland Security subcommittee on Emerging Threats and Cybersecurity, discusses the difficulty of legislating an issue that constantly changes.

Cybersecurity

3 stages of identity consolidation

These are the building blocks and the capabilities that result from a consolidated identity management system.

Cybersecurity

6 ways unified identity management pays off

The benefits associated with implementing a unified identity system include security, compliance and interoperability.

Cybersecurity

Access granted: NIH opens doors to medical resources

In March, the National Institutes of Health became the first government agency to accept two types of industry-standard online identity credentials that people can get for free.

Cybersecurity

Consolidating access control yields big payoffs

Centralizing formerly separate user identity management systems can lower costs, increase security and productivity, and lay the foundation for new online services.

Cybersecurity

World leaders crowd source solutions to global security

A European think tank issues 10 recommendations collected during a five-day online dialogue that included thousands of international experts, government policymakers and activists.

Cybersecurity

Making Dashboards Meaningful

Agencies are boosting transparency online, but making data meaningful is the real trick.

Cybersecurity

Recommended reading

NASA's new research network; DHS' version of the tricorder; finding the payback in the details.

Cybersecurity

Bill would set requirements for cyber coordinator

Senior House lawmakers want the Senate to approve presidential picks to head up a White House cyberspace office.

Cybersecurity

Computers and Stock Market Mayhem

In a span of <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/05/06/AR2010050604545.html?hpid=topnews">5 minutes</a> yesterday, the Dow Jones index tumbled faster than ever before. <a href="http://voices.washingtonpost.com/economy-watch/2010/05/lesson_of_todays_stock_market.html?hpid=topnews">The culprit</a>? It's still unclear, but it appears as if computer issues played an integral part alongside the economic crisis in Greece and the oil spill in the Gulf of Mexico. The point of emphasis here is that computers have become so embedded in our financial institutions that it's not even considered unreasonable to hypothesize the massive financial ramifications of a simple data entry error. The event's shock and awe almost demands that we consider how a cybersecurity breach could have a similar, if not far worse, impact.

Cybersecurity

Big Brother is watching in high definition

The Homeland Security Department is testing out a new 360-degree video surveillance system at Logan International Airport in Boston that is described as offering high-resolution imaging and analytics without the distortion of the typical fisheye lens.

Cybersecurity

Cybersecurity bill would penalize agencies for noncompliance

The Executive Cyberspace Authorities Act would require a review of cyber threats and proof of adherence to FISMA when submitting annual budgets.

Cybersecurity

Cybersecurity failings defy answers

Readers share their theories about why cybersecurity is so lousy in the federal government.

Cybersecurity

Blogger Spotlight: TSA's Blogger Bob

Curtis 'Bob' Burns brings subject-matter expertise and a sense of humor to the Transportation Security Administration blog.

Cybersecurity

Cyber Lesson from Oprah?

Oprah Winfrey kicked off the campaign "<a href="http://www.oprah.com/packages/no-phone-zone.html">No Phone Zone</a>" to combat texting while driving. I'm no O, but I've got a public service announcement of my own. It's called "Report Wicked Websites."