Cybersecurity

NIST releases cybersecurity guidelines for smart grid

Guidelines are a good step forward, but they focus only on securing individual devices, not on tightening security for how different parts of the system will be connected, experts say.

Cybersecurity

DHS to expand cybersecurity program for researchers

Officials believe giving cyber specialists access to information about real-world network attacks could lead to better solutions to protecting computers.

News

CBP failed to follow basic security practices to protect financial systems

Administrators didn't review employees' rights to access files, enforce stringent password requirements, or block users from logging on after several failed attempts.

News

E-file system to flag errors in claims of foreign earned income

A new version will include an application to correct the erroneous tax exclusions, which cost the government $90 million in 2008.

IT Modernization

Agencies use old and new tech to monitor, prepare for Hurricane Earl

The National Hurricane Center relies on satellite images supplemented by advanced equipment that accurately measures wind speeds, while FEMA taps in to social media to help residents prepare for landfall.

CIO Briefing

Wikileaks case could be the push to update espionage laws

Lawyer Gilead Light says social media and the volume of electronic information creates new ways to leak classified data, something decades-old statutes never envisioned.

Cybersecurity Report

RIM Makes Nice

In the latest attempt by Research In Motion to juggle the privacy of its customers with the demands of foreign governments, the company offered to lead an industry forum in India to develop recommendations for policies and processes aimed at preventing the misuse of encryption technologies.

IT Modernization

Red Hat announces strategy that allows mixing cloud platforms

Tools and capabilities would allow customers to build and move applications in and out of different cloud and virtual environments.

News

Drill tests law enforcement's ability to respond to a nuclear threat

Officials run through warning signs and procedures for following up.

Cybersecurity

Intel's purchase of McAfee not a game changer for security

The buy pushes the chip maker further into the cyber market, but it won't affect development.

Cybersecurity

Roles and responsibilities key to making cybersecurity work

Security experts emphasize the need for pending bills on the Hill to clarify who has cyber oversight.

News

Employees still pose biggest security threat, survey finds

Almost 60 percent of government security experts say agency insiders who have access to sensitive information are the most likely cyber criminals.

News

Most attacks on federal networks financially motivated

Data shows hackers want to steal money, not classified information.

CIO Briefing

Administration investigates technologies that promote green buildings

Other than new tools, sustainability requires changing design and construction processes, observer says.

News

Agencies could be prone to new kind of sophisticated cyberattack

The government should watch out for "man-in-the-browser" attacks that have been used to steal money from financial institutions, security expert says.

News

Travelers fee will help support electronic screening program

Part of the sum that Homeland Security collects from Visa Waiver Program will go toward an IT system for assessing security risks.

CIO Briefing

Successful attack on nation's infrastructure is 'when,' not 'if'

In a Nextgov interview, celebrity-hacker-turned-security-guru Marc Maiffret says systems that control major operations like transportation and utilities can be easily breached -- and already are under attack.

Cybersecurity Report

On Infiltrating Defense Networks (Again)

Operation Network Raider was <a href=http://www.fbi.gov/pressrel/pressrel10/convictions_050610.htm>considered a big win</a> for the Justice Department, and in many respects it was: The sting operation targeting the illegal distribution of counterfeit network hardware manufactured in China resulted in 30 felony convictions and more than 700 seizures of counterfeit Cisco network hardware and labels.

IT Modernization

U.S. should lead by example in free and open Internet, advocacy group says

Reaction to the United Arab Emirates' ban on BlackBerry services highlights a double standard for domestic versus international telecommunications policies, digital rights advocate argues.

News

TSA says all cargo on domestic flights now screened

The agency continues to face problems in checking freight flying into the United States from other countries.