Is the smart phone the new laptop?
Professionals eschew the bulky laptop for more portable network devices, and the bad guys are taking notice.
Updating IT systems? These checklists help you do it right.
NIST's checklist program continues to be updated to help automate configuration and monitoring of IT systems.
6 tips for securing IPv6
Despite the long-term promise of improved security, the transition to IPv6 will bring additional problems to the network in the short term. Here are six tips to help you handle them.
The battle begins over government’s role in protecting cyberspace
A House panel hears opinions from the administration and industry on Internet regulation, breach notification, cyber war and who should have oversight for cybersecurity.
IP network delivers services to max-security prisoners, without having to move them
The Colorado State Penitentiary's administrative segregation unit deployed in-cell computer kiosks to provide visitation and other services to prisoners who must be locked up for as long as 23 hours a day.
Max security inmates help lock down prison network
A high-speed network and in-cell computers help make Colorado's new maximum security prison secure, but inmates find holes in the IT security just by being themselves.
Cyber plan would give president kill switch power, senators warn
Proposed cybersecurity legislation's reliance on the 77-year-old Telecommunications Act could give the president broad powers over the Internet during an emergency.
Bank-robbing ZeuS Trojan returns: Is it just good business?
Source code for ZeuS malware has been leaked on the Internet -- or has it? At least one researcher thinks it could be a freeware marketing ploy to build demand for peripheral services.
Is an 'alternate Internet' the only refuge from mounting threats?
An FBI official suggests that a separate domain that would allow attribution of activities could provide a level of security that has not been attained on the Internet.
Can US get international cooperation on Internet conduct?
Recognizing that distributed systems require distributed action, the Obama administration calls for international cooperation to support an open, interoperable Internet but provides no timelines or milestones.
User beware: Bin Laden sleeps with the phishes
In the wake of the death of Osama bin Laden, DHS offers advice on how to avoid falling victim to themed spear-phishing attacks.
With a click, employees invite a vampire into the network
A number of disturbing breaches this year illustrate the difficulty of protecting IT systems and networks against an insider who insists on letting Dracula in the door.
White House sets strategy for international cyber behavior
Document lays out framework for interagency and international cooperation to establish norms for responsible behavior in cyberspace.
NIST looks to define the pros and cons of cloud models
New National Institute for Standards and Technology report describes the variety of cloud systems and discusses their strengths and weaknesses for government users.
Under cybersecurity plan, agencies would answer to DHS
An administration proposal would give security authority over federal systems to DHS and establish a national breach notification requirement, but provides little authority over privately owned critical infrastructure.
White House cyber plan would expand role of DHS, private sector
Cybersecurity legislation being proposed by the Obama administration favors public/private cooperation over regulation and gives DHS oversight of FISMA.
Mobile computing ripe for 'catastrophic malware disaster,' report states
Although reported software vulnerabilities are declining, criminals are following the crowds to mobile devices and social networking sites, where a lack of oversight creates a potentially dangerous cocktail.
After US crackdown on botnets, cyber criminals run to Canada
Cyber criminals appear to be moving malicious servers to Canada to flee law enforcement crackdowns in the United States, although we're still No. 1 in malicious servers.
Federal IT security workforce could double in 5 years*
A survey of C-level executives predicts that the federal IT security workforce will double in the next five years, but budget squeezes and a shortage of qualified workers might make that a tall order to fill.
If crypto keys aren't protected, they can't protect data
Cryptographic keys are the foundation of data security; NIST is updating recommendations for how keys should be securely generated, stored, distributed and disposed of.
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Manage Consent Preferences
Strictly Necessary Cookies - Always Active
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data, Targeting & Social Media Cookies
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
Strictly Necessary Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Functional Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Performance Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Social Media Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Targeting Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Help us tailor content specifically for you: