Cybersecurity
NIST releases cybersecurity guidelines for smart grid
Guidelines are a good step forward, but they focus only on securing individual devices, not on tightening security for how different parts of the system will be connected, experts say.
Cybersecurity
DHS to expand cybersecurity program for researchers
Officials believe giving cyber specialists access to information about real-world network attacks could lead to better solutions to protecting computers.
Digital Government
CBP failed to follow basic security practices to protect financial systems
Administrators didn't review employees' rights to access files, enforce stringent password requirements, or block users from logging on after several failed attempts.
Digital Government
E-file system to flag errors in claims of foreign earned income
A new version will include an application to correct the erroneous tax exclusions, which cost the government $90 million in 2008.
Modernization
Agencies use old and new tech to monitor, prepare for Hurricane Earl
The National Hurricane Center relies on satellite images supplemented by advanced equipment that accurately measures wind speeds, while FEMA taps in to social media to help residents prepare for landfall.
Digital Government
Wikileaks case could be the push to update espionage laws
Lawyer Gilead Light says social media and the volume of electronic information creates new ways to leak classified data, something decades-old statutes never envisioned.
Cybersecurity
RIM Makes Nice
In the latest attempt by Research In Motion to juggle the privacy of its customers with the demands of foreign governments, the company offered to lead an industry forum in India to develop recommendations for policies and processes aimed at preventing the misuse of encryption technologies.
Modernization
Red Hat announces strategy that allows mixing cloud platforms
Tools and capabilities would allow customers to build and move applications in and out of different cloud and virtual environments.
Digital Government
Drill tests law enforcement's ability to respond to a nuclear threat
Officials run through warning signs and procedures for following up.
Cybersecurity
Intel's purchase of McAfee not a game changer for security
The buy pushes the chip maker further into the cyber market, but it won't affect development.
Cybersecurity
Roles and responsibilities key to making cybersecurity work
Security experts emphasize the need for pending bills on the Hill to clarify who has cyber oversight.
Digital Government
Employees still pose biggest security threat, survey finds
Almost 60 percent of government security experts say agency insiders who have access to sensitive information are the most likely cyber criminals.
Digital Government
Most attacks on federal networks financially motivated
Data shows hackers want to steal money, not classified information.
Digital Government
Administration investigates technologies that promote green buildings
Other than new tools, sustainability requires changing design and construction processes, observer says.
Digital Government
Agencies could be prone to new kind of sophisticated cyberattack
The government should watch out for "man-in-the-browser" attacks that have been used to steal money from financial institutions, security expert says.
Digital Government
Travelers fee will help support electronic screening program
Part of the sum that Homeland Security collects from Visa Waiver Program will go toward an IT system for assessing security risks.
Digital Government
Successful attack on nation's infrastructure is 'when,' not 'if'
In a Nextgov interview, celebrity-hacker-turned-security-guru Marc Maiffret says systems that control major operations like transportation and utilities can be easily breached -- and already are under attack.
Cybersecurity
On Infiltrating Defense Networks (Again)
Operation Network Raider was <a href=http://www.fbi.gov/pressrel/pressrel10/convictions_050610.htm>considered a big win</a> for the Justice Department, and in many respects it was: The sting operation targeting the illegal distribution of counterfeit network hardware manufactured in China resulted in 30 felony convictions and more than 700 seizures of counterfeit Cisco network hardware and labels.
Modernization
U.S. should lead by example in free and open Internet, advocacy group says
Reaction to the United Arab Emirates' ban on BlackBerry services highlights a double standard for domestic versus international telecommunications policies, digital rights advocate argues.
Digital Government
TSA says all cargo on domestic flights now screened
The agency continues to face problems in checking freight flying into the United States from other countries.
Almost There!
Help us tailor content specifically for you: