Industry coalition plans interoperability program

The Initiative for Open Authentication intends to introduce an interoperability program for member vendors using its open architecture for online identity verification.

How a process model can help bring security into software development

A secure software development life cycle requires a process model wherein process improvements are managed from a common framework. This disciplined approach will not alleviate all vulnerabilities but will increase the likelihood of building secure software to meet users’ needs in a cost-effective fashion.

Critics not satisfied with partial revelation of secret cybersecurity plan

Observers welcomed the release of summary of the government's classified cybersecurity initiative, but some want the Obama administration to give more details.

The human element complicates cybersecurity

Despite the congressional focus on cybersecurity, all the money, software and hardware in the world can’t entirely ward off cybersecurity threats. One nontechnology factor greatly impedes cybersecurity: the human factor.

Nation's cybersecurity suffers from a lack of information sharing

Lack of trust between the government and private sectors still inhibits information sharing needed to defend against rapidly evolving cyberthreats.

FISMA's future may lie in State Department security model

With some reworking of the Federal Information Security Management Act likely, the State Department's program of continuous monitoring and assessment proints the way for what can be done with IT security.

Updated crypto standards will have an impact on security products

With new standards in the works for a Secure Hashing Algorithm and cryptographic modules, vendors of security products will have a new set of requirements they will have to meet to sell to government agencies. Some are already planning for the changes.

Interoperability is key to securing data at rest

Companies that enable managed file transfers between enterprises and their partners are expanding capabilities to include security for data at rest as well as in transit. But new standards are needed to ensure the interoperability of these schemes.

The next Secure Hash Algorithm had better be a good one

The new Secure Hash Algorithm might have to last for 20 years, so there is consderable pressure for NIST to do the current competition for SHA-3 right.

Flash media vendors eye DOD market despite strict rules

The Defense Department has eased its blanket ban on removable devices such as USB drives, and vendors are responding with tamper-proof hardware, FIPS 140-2 validated encryption engines and on-board antivirus

Military still gives thumbs down to thumb drives

Despite relaxing the all out ban on using portable storage devices on Defense Department computer systems, it appears thumb drives will not return to the military services anytime soon.

White House lifts the veil on Bush cybersecurity initiative

National cybersecurity coordinator Howard Schmidt announced at the RSA Security Conference that, beginning today, newly declassified portions of the CNCI will be available online.

Kanguru adds anti-malware to a line of USB drives

Kanguru Solutions adds anti-malware software to develop the Defender Elite secure flash drives.

Verizon releases framework for reporting security incidents

There is a trend toward standardizing language used to identify vulnerabilities and threats, but so far the trend has not extended to the reporting of security incidents.

Microsoft-led task force busts botnet

Microsoft's Digital Crimes Unit, in conjunction with the Botnet Task Force, took legal action this week after months of investigation into a botnet known as W32.Waledac, which according to Microsoft had the capability to send as many as 1.5 billion spam e-mails a day.

Microsoft unplugs spammer botnet with legal strategy

The lawsuit filed last week my Microsoft against the bot-herders of the Waledac botnet used existing laws to disconnect the malicious domains from the Internet — at least for now.

U.S. would lose a cyber war, former intell chief warns

The country needs to make a national commitment to securing cyberspace before a catastropic attack occurs.

NIST takes on risk management and PIV card security

NIST has finalized three publications that give guidelines for using a risk management framework and for securing certificates and data on PIV cards.

DOD details strict flash drive rules

A DOD policy that bans using flash drives was relaxed recently because of adjustments made to Defense Department computer systems. But that doesn't mean there are no more limitations on their use.

Navy looks to advance cyber defense

The Navy wants algorithms that can be used for malware detection and to distinguish between legitimate and malicious traffic.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.