Cybersecurity

GAO on board with Secure Flight plans

The Transportation Security Administration has generally achieved all 10 statutory conditions for its program to take over the checking of air travelers against watch lists.

Cybersecurity

Navy's World Class Cyber Command

When it comes to cybersecurity, the U.S. Navy is way ahead of its time, says Alan Paller, director of research for the SANS Institute, where I work as managing editor.

Cybersecurity

The Perils of Web 2.0

Social media use is on federal IT decisionmakers' list of the biggest security risks, according to a new <a href=http://www.lumension.com/Federal-Cyber-Security-Outlook-for-2010.aspx>report</a> from Lumension, a security company.

Cybersecurity

Experts Debate Cyberwar Defense

<a href="http://www.ranum.com/">Marcus Ranum</a> and <a href="http://csis.org/experts">James Lewis</a> wrote competing op-eds on cyberwar last week, but I think they agree on more than they let on.

Cybersecurity

Intell chief wants more information sharing

More integration between collection and analysis capabilities can be achieved by intelligence agencies during the next five years, the country's top intelligence officer said today.

Cybersecurity

'Most Dangerous' -- Spear Phishing

<a href="http://www.ehow.com/how_4892992_recognize-spear-phishing-scams.html"></a>Ed Skoudis calls <a href="http://en.wikipedia.org/wiki/Phishing">spear phishing</a> "an oldie-but-goodie attack," but I can't figure out what's good about it. Spear phishing is a highly targeted e-mail with either an appended malicious attachment or a dangerous Web site link to client-side exploits. Strangely, the attack was birthed in the most inauspicious of ways; clumsy grammar and preposterous scenarios. How's that for irony? Imagine some e-mail, laden with broken English, lands in your inbox from halfway across the world detailing a half-baked scenario. And, what do we do? We click. I've done it. You've probably done it. <a href="http://voices.washingtonpost.com/securityfix/2009/06/spear-phishing_gang_resurfaces.html">We all regret it</a> (you won't regret the link).

Cybersecurity

How influential is the cybersecurity coordinator?

Government Information Security

Cybersecurity

Another View on the Cybersecurity Act

The 2009 Cybersecurity Act has been pretty much <a href="http://www.nextgov.com/nextgov/ng_20090401_6424.php?oref=search">hailed</a> as a big step in correcting much of what has hobbled the effort to secure networks key to operating the day-to-day functions of the United States and government.

Cybersecurity

Navy withheld data breach information for more than a year

The Navy knew right away that 244 employees' Social Security numbers had been released. Why did officials wait for 17 months before telling them?

Cybersecurity

GSA must secure online construction data, audit finds

GSA's Public Building Service needs to lock down sensitive building project data when posting it in a shared online intranet, IG says.

Cybersecurity

Your Friday Cyber Break

What is Moonlight Maze? No, not the latest installment of the popular Twilight saga. Rather, it's the code name for a 1998 cyber attack on NASA, the Pentagon and the Energy Department. The attack, which originated in Russia, was one of 33 major cyber incidents in the United States from 1997 to 2010, according to Aviation Week.

Cybersecurity

Some Justice laptops lack encryption, IG finds

The Justice Department's Criminal Division needs to make sure that its laptops and those used by its contractors have required security protections, the department's IG says.

Cybersecurity

IBM Takes on Aviation Security

Cyber attacks keep Federal Aviation Administrator Randy Babbitt up at night. In a speech Thursday at the FAA IT conference in Orlando, Fla., Babbitt highlighted the importance of professionalism, information sharing and security awareness in combatting cyber threats.

Cybersecurity

First responders connect via DHS online network

The Homeland Security Department hopes 500,000 local, state and federal first responders will join a new online professional network DHS has created for them.

Cybersecurity

The military services are working out security policies for thumb drive use

Given the potential threats and technical hurdles, officials expect it will take time to develop new guidelines for transferring data on flash media.

Cybersecurity

Privacy Gets a Boost

Privacy groups have been pushing for years to revise a federal privacy law that pertains to digital media. They got a start yesterday. Sen. Patrick Leahy, D-Vt., chairman of the Senate Judiciary Committee, and Rep. John Conyers Jr., D-Mich., chairman of the House Judiciary Committee, said they intend to hold hearings this spring on amending the Electronic Communications Privacy Act.