Cybersecurity
Security at your fingertips
Employees in at least one DOD office no longer have to remember passwords or ID numbers.
Cybersecurity
Energy halts use of classified discs, drives
The department's secretary ordered all Energy operations using controlled removable electronic media to stop until media protection procedures improve.
Cybersecurity
Inspector general: DHS' cybersecurity efforts only partly successful
Many operational aspects remain unclear and incomplete, the inspector general says.
Cybersecurity
IRS auditors call for constraints on contractors' computer access
Investigators say some contractors blatantly circumvented IRS security policies and procedures.
Cybersecurity
Feds need to fund more IT research
Additional money should be allocated to cybersecurity R&D, lawmakers say
Cybersecurity
Putnam: Amending Clinger-Cohen
Security must be a key element of decisions on buying IT goods and services.
Cybersecurity
The outsourcing hole
As more software development is shifted overseas, concerns grow about security
Cybersecurity
NIST helps on security budgets
NIST Special Publication 800-65 presents seven steps to ensure that IT budget requests comply with the Federal Information Security Management Act of 2002.
Cybersecurity
Two more from NIST
A pair of new publications from the National Institute of Standards and Technology provide technical help for government agencies and businesses that are required to protect information systems.
Cybersecurity
Lieberman rips DHS wireless
The Democratic senator and frequent critic of the administration's homeland security policy blasts DHS about its wireless security holes.
Cybersecurity
NIST aims to ease XP security setup
The draft of SP 800-68 has recommendations and checklists for Windows XP security.
Cybersecurity
Malicious server halted
A Russian site that had been downloading code to steal information from users has apparently been shut down.
Cybersecurity
Putnam: Clinger-Cohen needs a cybersecurity boost
Proposed amendment would make security an essential part of IT buys
Cybersecurity
Wireless worm appears
Security firm F-Secure warns of a worm that spreads through Bluetooth.
Cybersecurity
Putnam, Davis, propose Clinger-Cohen amendment
The House chairmen say their bill would strengthen federal IT security.
Cybersecurity
Security officials play nice
They have no choice, since they can't force network users to plug holes.
Cybersecurity
Congress antsy about TSA tech tests
Lawmakers: Agency needs to test less, implement more
Cybersecurity