Feds seek help in fending off cybercrimes
Thirteen years after the Defense Department established the first computer emergency response team, and three years after formation of the National Infrastructure Protection Center, white hats still are outgunned in the battle against cybercrime.
Security holes limit federal use of wireless networks
Wireless networks are fast to set up and flexible enough to let workers roam through an office or campus.
Feds say virus threats keep them awake at night
What's in a name? Code Red, Kournikova, Melissa, I Love You? Whatever. To federal information technology managers, they're all names for malicious code, and that's what they worry about most, a GCN telephone survey on systems security found.
U.S., U.K. find suspected worm author
The FBI announced this week that a 24-year-old man was arrested in the United Kingdom in connection with propagating the so-called W32-Leave.worm, or Leaves worm, to Internet-connected PCs running 32-bit Microsoft Windows operating systems.
Study says CIA's In-Q-Tel is on right track, but needs fine-tuning
An independent panel evaluating the Central Intelligence Agency's information technology incubator company said that In-Q-Tel should be given a chance to prove itself, but that the CIA should develop a better process for implementing new technology in the agency.
Son-of-Code-Red brings new risk to vulnerable servers
A new Internet worm that exploits the same vulnerability as Code Red is installing back doors on servers that leave infected machines wide open to future exploitation.
Feds electronically sign documents without PKI
Users at about 80 federal agencies including the IRS and the Mint are digitally signing documents without a public-key infrastructure.
Crackerjack security
Federal information technology managers' data encryption options are about to expand.
GAO targets financial center's security steps
A federal agency that processes more than $9 billion in payroll accounts for 200,000 employees has serious weaknesses in its computer security that leave its systems open to potential misuse, a General Accounting Office report found.
Horn: CIA's stand assaults authority
House lawmakers, fuming at the CIA's refusal to participate in a recent computer security survey, question whether the rebuff jeopardizes congressional oversight of the agency.
FAA to use e-signatures in maintenance records
The Federal Aviation Administration's Flight Standards Service is preparing an operational bulletin that will allow digital signatures on aircraft maintenance records.
Agencies leery of PKI storage without guidance
Agencies that use digital certificates have found themselves working without a net in terms of electronic record-keeping.
Bush security panel plan gets mixed reviews
Some experts doubt that the president's plan to restructure government cybersecurity will improve the protection of critical networks.
Hackers make a beeline
LAS VEGAS'When the Naval Postgraduate School in Monterey, Calif., designed a so-called honeynet to trap hackers, it worked even better than expected.
Detection systems require tuning
Intrusion detection is the latest tool for network security, but feds who have tried it find it far from simple.
GSA promotes new tools to encourage PKI use
The newest public-key infrastructure offerings under the General Services Administration's Access Certificates for Electronic Services program are unlikely to kick-start wide acceptance of PKI in the government, a GSA official contends.
Fingerprint ID devices are ready to make their mark
This year's edition of the FBI's annual computer security survey, conducted with the Computer Security Institute of San Francisco, revealed some cold, hard facts about cybercrime.
How to stop a service denial attack before it stops you
It's not easy to defend a federal Web server against distributed service denial attacks, but it's not impossible either.
U.S. is losing ground on IT security, witnesses tell Hill
Cybersecurity is slipping, a panel of experts last month told lawmakers at a hearing of the Joint Economic Committee.
NSF taps vendor to oversee its net security
The National Science Foundation has chosen Network Security Technology Inc. of Herndon, Va., for network security services.
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Manage Consent Preferences
Strictly Necessary Cookies - Always Active
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data, Targeting & Social Media Cookies
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
Strictly Necessary Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Functional Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Performance Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Social Media Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Targeting Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.