Cybersecurity

USAID implements wireless intrusion-prevention system

AirTight Networks provides technology to keep out eavesdroppers

Cybersecurity

Texas works on P2P policy

It will likely explain when using file-sharing applications is illegal or allowed and no threat to state systems.

Cybersecurity

CSC unit achieves CMMI Level 3 rating

The ratings signify the degree to which an organization has linked its management and engineering practices to its business objectives.

Cybersecurity

DHS asks for Secure Border bids

The Homeland Security Department has touted the initiative as a comprehensive way to control the border and enforce immigration laws.

Cybersecurity

Love it or hate it, it’s the law

Experts are predicting a struggle for agencies trying to meet the minimum security requirements under FIPS 200.

Cybersecurity

The Pipeline

Blocking the bad guys; Pardon the extrusion; Securing a wireless world

Cybersecurity

Symantec to protect databases

High-profile security breaches have revealed the vulnerability of information held in large databases.

Cybersecurity

Cyberattackers can exploit Pentium self-defense

The vulnerability affects every computer that runs on x86 architecture, an expert said at the CanSecWest/core06 conference.

Cybersecurity

TSA privacy policy hit

Agency has exempted airport screening system from privacy safeguards and laws, critics charge.

Cybersecurity

GAO: SEC's info security not up to snuff

A report states that officials have addressed only eight of 51 weaknesses a previous report documented.

Cybersecurity

Nevada unveils info-sharing system

The Nevada Shared Information Technologies Services would allow local government agencies to participate in shared-use facilities.

Cybersecurity

Fail-safe storage options

New options promise faster recovery plus better data protection at headquarters and remote sites

Cybersecurity

The Pipeline

Security is in the air; Lost and found.

Cybersecurity

Time for a new look at security

Intelligence community experts plan to streamline their security procedures.

Cybersecurity

Lack of oversight endangers missile defense

The inspector general and defense analysts point to network security and policy missteps.

Cybersecurity

NIST releases revised card standards

The document, Special Publication 800-73-1, interprets the standards to ensure interoperability and performance.

Cybersecurity

New report details ITMS failures

The IG found that TSA mismanaged a $1 billion Unisys contract, but that the agency has since adopted a better-managed acquisition strategy.

Cybersecurity

Security system checks take too long, experts say

Current certification and accreditation processes for federal information systems don’t reflect the modern network environment, a panel said today.

Cybersecurity

GAO: Security accreditation program a tough sell

The National Information Assurance Partnership suffers from a lack of good metrics and limited product listings.

Cybersecurity

IRS cracks down on phishers

You can now forward suspicious e-mail messages to the agency for inspection.