Cybersecurity
GAO on board with Secure Flight plans
The Transportation Security Administration has generally achieved all 10 statutory conditions for its program to take over the checking of air travelers against watch lists.
Cybersecurity
Navy's World Class Cyber Command
When it comes to cybersecurity, the U.S. Navy is way ahead of its time, says Alan Paller, director of research for the SANS Institute, where I work as managing editor.
Cybersecurity
The Perils of Web 2.0
Social media use is on federal IT decisionmakers' list of the biggest security risks, according to a new <a href=http://www.lumension.com/Federal-Cyber-Security-Outlook-for-2010.aspx>report</a> from Lumension, a security company.
Cybersecurity
Experts Debate Cyberwar Defense
<a href="http://www.ranum.com/">Marcus Ranum</a> and <a href="http://csis.org/experts">James Lewis</a> wrote competing op-eds on cyberwar last week, but I think they agree on more than they let on.
Cybersecurity
Intell chief wants more information sharing
More integration between collection and analysis capabilities can be achieved by intelligence agencies during the next five years, the country's top intelligence officer said today.
Cybersecurity
'Most Dangerous' -- Spear Phishing
<a href="http://www.ehow.com/how_4892992_recognize-spear-phishing-scams.html"></a>Ed Skoudis calls <a href="http://en.wikipedia.org/wiki/Phishing">spear phishing</a> "an oldie-but-goodie attack," but I can't figure out what's good about it. Spear phishing is a highly targeted e-mail with either an appended malicious attachment or a dangerous Web site link to client-side exploits. Strangely, the attack was birthed in the most inauspicious of ways; clumsy grammar and preposterous scenarios. How's that for irony? Imagine some e-mail, laden with broken English, lands in your inbox from halfway across the world detailing a half-baked scenario. And, what do we do? We click. I've done it. You've probably done it. <a href="http://voices.washingtonpost.com/securityfix/2009/06/spear-phishing_gang_resurfaces.html">We all regret it</a> (you won't regret the link).
Cybersecurity
Another View on the Cybersecurity Act
The 2009 Cybersecurity Act has been pretty much <a href="http://www.nextgov.com/nextgov/ng_20090401_6424.php?oref=search">hailed</a> as a big step in correcting much of what has hobbled the effort to secure networks key to operating the day-to-day functions of the United States and government.
Cybersecurity
Navy withheld data breach information for more than a year
The Navy knew right away that 244 employees' Social Security numbers had been released. Why did officials wait for 17 months before telling them?
Cybersecurity
GSA must secure online construction data, audit finds
GSA's Public Building Service needs to lock down sensitive building project data when posting it in a shared online intranet, IG says.
Cybersecurity
Your Friday Cyber Break
What is Moonlight Maze? No, not the latest installment of the popular Twilight saga. Rather, it's the code name for a 1998 cyber attack on NASA, the Pentagon and the Energy Department. The attack, which originated in Russia, was one of 33 major cyber incidents in the United States from 1997 to 2010, according to Aviation Week.
Cybersecurity
Some Justice laptops lack encryption, IG finds
The Justice Department's Criminal Division needs to make sure that its laptops and those used by its contractors have required security protections, the department's IG says.
Cybersecurity
IBM Takes on Aviation Security
Cyber attacks keep Federal Aviation Administrator Randy Babbitt up at night. In a speech Thursday at the FAA IT conference in Orlando, Fla., Babbitt highlighted the importance of professionalism, information sharing and security awareness in combatting cyber threats.
Cybersecurity
First responders connect via DHS online network
The Homeland Security Department hopes 500,000 local, state and federal first responders will join a new online professional network DHS has created for them.
Cybersecurity
The military services are working out security policies for thumb drive use
Given the potential threats and technical hurdles, officials expect it will take time to develop new guidelines for transferring data on flash media.
Cybersecurity