Cybersecurity
Expert: Wireless security is all about location
Authenticating wireless users by the location of the access points they use is a good benchmark for role-based access to networks, said Matthew Gray of Newbury Networks.
Cybersecurity
Voltage, Tablus join forces
Companies will help users find, control and protect sensitive data better.
Cybersecurity
Editorial: The dangers of secrecy
A representative democracy only works when the actions of individuals and the operations of institutions are transparent
Cybersecurity
Security experts fault FISMA paperwork
After five years in which federal agencies have been graded on their compliance with federal security laws, some question the meaning of annual security grades.
Cybersecurity
Symantec: More phishers impersonate government
People probably trust sites that look like government Web pages more than commercial ones, an expert said.
Cybersecurity
Cisco unveils new security mgt suite
The product suite includes the new Cisco Security Manager as well as new a version of the company's monitoring, analysis and response system.
Cybersecurity
CDW-G assesses state, local IT spending
It looks at what is involved in developing robust IT security.
Cybersecurity
Panel: Industry crucial to fighting cybercrime
The United States also needs international cooperation agreements.
Cybersecurity
DHS official lays out cybersecurity responsibilities
Jonathan Frankel said the department is working with industry and standards bodies to create procurement requirements.
Cybersecurity
FBI chief wants stronger partnerships
The FBI wants to form stronger partnerships with the private sector and academia to prevent cybercrime, the bureau's director told attendees at the RSA Conference.
Cybersecurity
Gates: Simplify security
Vendors have to make it easier for everyone to use the security features in software, Microsoft's founder tells audience at RSA Conference.
Cybersecurity
AppSecInc. secures databases
AppRadar 3.0 defends against application vulnerabilities in real time and ensures adherence to regulatory requirements.
Cybersecurity
McNealy: Kill Frankenstein, Dolly
Sun Microsystems CEO wants more standardization of equipment and more diverse security systems.
Cybersecurity
The company that came in from the cold
Collaboration firm wants to expand beyond spy agencies
Cybersecurity
DHS evaluates global cybersecurity exercise
Cyber Storm aims to determine how well public and private organizations worked together in a simulated attack.
Cybersecurity
More clearance, more money
Job candidates who have passed polygraph tests earn an average of $10,000 or more a year than those who have not taken the tests.
Cybersecurity
Port officials want hands off grant program
Representatives of the nation’s public seaports oppose President Bush’s proposal to lump a dedicated grant program to improve port security into a larger funding pool.
Cybersecurity
NIST completes biometric specs
The new document describes the procedures and formats for storing fingerprints and facial images required for compliance with the FIPS 201 standard.
Cybersecurity
Pennsylvania adopts e-notarization
Pennsylvania’s Electronic Notary Seal program could serve as a model for offering real-time authentication of notaries.
Cybersecurity