Cybersecurity
Army honors security work
The Army issued its first awards for excellence in information assurance
Cybersecurity
Beefing up NIPRNET
But IT workers must install products correctly and patches more quickly, a DISA official says.
Cybersecurity
Air Force conference notes: New mail security
The Air Force will replace encryption cards and create a profile of one of its networks to find vulnerabilities. And Sun's Scott McNealy sounds off.
Cybersecurity
OMB unveils FISMA how-to
Final instructions were given to federal agencies for filing mandatory reports on their systems security efforts in 2004.
Cybersecurity
Follow the data
The challenge is understanding the data and how it flows through an agency.
Cybersecurity
ROI that's difficult to compute
ROI in new cryptographic technologies is difficult to calculate, which is why experts typically dodge questions about it.
Cybersecurity
Different tech for different problems
Federal agencies are limited to cryptographic technologies validated by NIST.
Cybersecurity
NIST makes lists
A security checklists program for information technology products is on track for completion before the end of 2004.
Cybersecurity
Arming against viruses
Security community members try to keep up with constantly changing threats
Cybersecurity
Los Alamos vulnerable to PC theft, inspector general declares
Some classified desktop computers were not properly inventoried, according to an IG report.
Cybersecurity
Amoroso: Putnam amendment deserves a look
Rather than centralizing patch management, officials should consider centralizing some network security functions, says AT&T's CIO.
Cybersecurity
Taming the wild west
Energy poised to rein in data losses at its labs, but institutional demons remain
Cybersecurity
Johns Hopkins leads in cyber education
Johns Hopkins is a model for colleges and universities in the area of cybersecurity and information technology education.
Cybersecurity
A trail of mishaps
Los Alamos National Laboratory has a history of security lapses involving classified removable electronic media.
Cybersecurity
Pondering private infrastructure data
The Homeland Security Department is still figuring out the best way to handle sensitive information that the private sector voluntarily submits to the government.
Cybersecurity
Seven of 24 meet security requirements
A recent audit found that 17 of the 24 largest federal agencies don't comply with a law requiring that they certify and accredit their systems' security.
Cybersecurity
FTC pushes e-mail standard
A sharp rise in phishing attacks has prompted FTC officials to call on tech industry leaders to adopt an authentication standard for e-mail.
Cybersecurity