Cybersecurity

Army honors security work

The Army issued its first awards for excellence in information assurance

Cybersecurity

Beefing up NIPRNET

But IT workers must install products correctly and patches more quickly, a DISA official says.

Cybersecurity

Air Force conference notes: New mail security

The Air Force will replace encryption cards and create a profile of one of its networks to find vulnerabilities. And Sun's Scott McNealy sounds off.

Cybersecurity

OMB unveils FISMA how-to

Final instructions were given to federal agencies for filing mandatory reports on their systems security efforts in 2004.

Cybersecurity

Follow the data

The challenge is understanding the data and how it flows through an agency.

Cybersecurity

ROI that's difficult to compute

ROI in new cryptographic technologies is difficult to calculate, which is why experts typically dodge questions about it.

Cybersecurity

Different tech for different problems

Federal agencies are limited to cryptographic technologies validated by NIST.

Cybersecurity

NIST makes lists

A security checklists program for information technology products is on track for completion before the end of 2004.

Cybersecurity

Threats defined

Threats defined

Cybersecurity

Arming against viruses

Security community members try to keep up with constantly changing threats

Cybersecurity

Los Alamos vulnerable to PC theft, inspector general declares

Some classified desktop computers were not properly inventoried, according to an IG report.

Cybersecurity

Amoroso: Putnam amendment deserves a look

Rather than centralizing patch management, officials should consider centralizing some network security functions, says AT&T's CIO.

Cybersecurity

Unisys wins HHS e-mail deal

The contract is worth up to $31 million.

Cybersecurity

Taming the wild west

Energy poised to rein in data losses at its labs, but institutional demons remain

Cybersecurity

Johns Hopkins leads in cyber education

Johns Hopkins is a model for colleges and universities in the area of cybersecurity and information technology education.

Cybersecurity

A trail of mishaps

Los Alamos National Laboratory has a history of security lapses involving classified removable electronic media.

Cybersecurity

Pondering private infrastructure data

The Homeland Security Department is still figuring out the best way to handle sensitive information that the private sector voluntarily submits to the government.

Cybersecurity

Seven of 24 meet security requirements

A recent audit found that 17 of the 24 largest federal agencies don't comply with a law requiring that they certify and accredit their systems' security.

Cybersecurity

FTC pushes e-mail standard

A sharp rise in phishing attacks has prompted FTC officials to call on tech industry leaders to adopt an authentication standard for e-mail.

Cybersecurity

The allure of keyless entry

Changes in attitudes, policies pave the way for alternatives to PKI.