Cybersecurity

Expert: Wireless security is all about location

Authenticating wireless users by the location of the access points they use is a good benchmark for role-based access to networks, said Matthew Gray of Newbury Networks.

Cybersecurity

Voltage, Tablus join forces

Companies will help users find, control and protect sensitive data better.

Cybersecurity

Editorial: The dangers of secrecy

A representative democracy only works when the actions of individuals and the operations of institutions are transparent

Cybersecurity

Security experts fault FISMA paperwork

After five years in which federal agencies have been graded on their compliance with federal security laws, some question the meaning of annual security grades.

Cybersecurity

Symantec: More phishers impersonate government

People probably trust sites that look like government Web pages more than commercial ones, an expert said.

Cybersecurity

Cisco unveils new security mgt suite

The product suite includes the new Cisco Security Manager as well as new a version of the company's monitoring, analysis and response system.

Cybersecurity

CDW-G assesses state, local IT spending

It looks at what is involved in developing robust IT security.

Cybersecurity

Panel: Industry crucial to fighting cybercrime

The United States also needs international cooperation agreements.

Cybersecurity

DHS official lays out cybersecurity responsibilities

Jonathan Frankel said the department is working with industry and standards bodies to create procurement requirements.

Cybersecurity

FBI chief wants stronger partnerships

The FBI wants to form stronger partnerships with the private sector and academia to prevent cybercrime, the bureau's director told attendees at the RSA Conference.

Cybersecurity

Gates: Simplify security

Vendors have to make it easier for everyone to use the security features in software, Microsoft's founder tells audience at RSA Conference.

Cybersecurity

AppSecInc. secures databases

AppRadar 3.0 defends against application vulnerabilities in real time and ensures adherence to regulatory requirements.

Cybersecurity

McNealy: Kill Frankenstein, Dolly

Sun Microsystems CEO wants more standardization of equipment and more diverse security systems.

Cybersecurity

The company that came in from the cold

Collaboration firm wants to expand beyond spy agencies

Cybersecurity

DHS evaluates global cybersecurity exercise

Cyber Storm aims to determine how well public and private organizations worked together in a simulated attack.

Cybersecurity

More clearance, more money

Job candidates who have passed polygraph tests earn an average of $10,000 or more a year than those who have not taken the tests.

Cybersecurity

Port officials want hands off grant program

Representatives of the nation’s public seaports oppose President Bush’s proposal to lump a dedicated grant program to improve port security into a larger funding pool.

Cybersecurity

NIST completes biometric specs

The new document describes the procedures and formats for storing fingerprints and facial images required for compliance with the FIPS 201 standard.

Cybersecurity

Pennsylvania adopts e-notarization

Pennsylvania’s Electronic Notary Seal program could serve as a model for offering real-time authentication of notaries.

Cybersecurity

DHS to run cybersecurity exercise

Cyber Storm will test how well industry organizations work with one another and with DHS.