Health IT group to offer security certification to vendors

The Health Information Trust Alliance will certify security products against its Common Security Framework as the government moves to establish an infrastructure, national standards and privacy requirements for the handling of electronic health care records.

Invasion of the botnets: Cyberattacks on the rise

In the past year, the threat landscape has been marked not by the emergence of a sexy new vulnerability or exploit but by the sheer number of attacks and the increasing professionalization of the bad guys behind them.

When bits and bytes replace bullets and bombs

Cyberattacks against government and news media during last year’s invasion of Georgia allowed the Russian military to win without blowing up critical infrastructure. Is this good news or bad news?

When planning for information assurance, factor in the people

Because people issues usually trump technology issues, executives need to establish an IT security program that considers the people and the organization's regulatory environment, writes Ben Apple of Telos Corp.

NIST releases new draft of Special Publication 800-81 on securing DNS

To ensure the availability and integrity of the Domain Name System, NIST is updating its security guidelines. A second draft of the proposed revision has been released for public comment.

Best practices being crafted to enable broader use of mobile biometric devices

The growth of mobile information technology is moving biometric identification into the field, but functionality often is restricted by a lack of interoperability between systems. NIST has published a set of best practices to improve interoperability.

Health care, pharmaceuticals e-mail fuel onslaught as spam rates climb

Health care is the most common topic in unsolicited e-mail ads, according to the most recent threat forecast from MX Logic; spam watchdog adds that phony pharmacies predominate in online advertising.

DOD updates IPv6 Standard Profile

The updated IPv6 Standard Profile provides a technical and standards based definition of interoperability requirements for IPv6-capable products to be used in DOD networks.

When systems are connected, can any be called low impact?

The new NIST recommendations for IT security controls raise the question of whether it still makes sense to implement security controls based on the sensitivity of an individual system when those systems' perimeters are becoming more ill-defined.

Better security boosts agencies' use of wireless devices

Defense Department policies, such as the 8100.2 directive, and guidelines from the National Institute of Standards and Technology have laid the foundation for using technologies that conform to the government’s stringent requirements.

Former officials object to NIST plan to redistribute security work

UPDATED: NIST says the reorganization would improve efficiencies by giving the chief cybersecurity adviser broader authority and strengthening multidisciplinary collaboration; but former NIST officials object that the move would diminish leadership and focus of a vital national resource.

Crowbar cracks SD cards and retrieves data without a trace

If law enforcement or the military needs to hack an MMC/SD card, the Crowbar is a perfect tool. It has a few minor flaws and limited usage, which we feel makes it too pricey in its current form. But within those parameters, it works well.

With Security Blanket 3.0, you won't lose sleep over Web-facing servers

Security Blanket will automatically lock down Web-facing servers that run Red Hat Enterprise Linux, CentOS or Sun Solaris.

DISA tests security for amplified cellular signals, voice encryption

DISA is evaluating femtocell technology and how to more effectively encrypt unclassified but sensitive voice communications.

Joint Forces Command shares data across security levels

A project at the Joint Forces Command lets users exchange text messages and whiteboard-based graphics across varying levels of security classifications.

Forensics tools can help stop threats to ever-expanding networks

As threats have evolved, so have the tools for forensics investigations. Although forensics inspectors were once limited to conducting research only after an incident had taken place, they are now more likely to capture evidence in real time.

A sampling of IT forensics tools

More than 150 open-source and commercial computer forensics tools are available. Here is a sampling of some of them.

Aruba Networks new wireless LAN solution has FIPS 140-2 security

Aruba Networks says its ArubaOS Release 3 802.11n wireless LAN solution has been validated as being Federal Information Processing Standard 140-2 compliant for cryptographic security.

Microsoft working to eliminate Internet anonymity

Microsoft researchers have unveiled an anti-hacking concept that can help track hackers or malicious content to origin servers.

NIST releases guidelines for interoperable ID management credentials

NIST explains the use of new international standard enabling client applications to access identity credentials from different issuers, including the federal PIV card, and releases a proof-of-concept tool for using PIV with some common applications.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.