• Analyst group: Some companies cutting IT spending

    Many large companies, especially those in the financial services, utilities, and telecommunications industries, have cut their technology budgets this year because of the economic slowdown

  • U.S. military pushes for offensive cyber warfare capabilities

    U.S. officials have been reluctant to militarize the electronic medium, but a recently declassified report and electronic attacks on Georgia have set off an intense discussion among senior Pentagon officials about going on the offensive

  • Urgent inquiry as more personal data missing in Britain

    Another data loss blunder in Britain, as a disc containing the personal details of 5,000 employees of the National Offender Management Service (NOMS), who may include many prison officers, went missing

  • New York State gives company 45 days to fix problems

    New York State awarded M/A Com a contract for building the infrastructure for the statewide wireless network for first responders; the contract was to be completed by December 2006; state comptroller office, citing the delay and nearly 20 other deficiencies, gives company 45 days to fix problem or see its contract revoked

  • New metrics to help measure enterprise security

    A non-profit IT security organization is working toward releasing a set of metrics for enterprises to measure the effectiveness of their security controls

  • Growth in software market driven by security, identity protection concerns

    Information security concerns propel market for software products, according to a new report by Global Industry Analysts

  • Spending on IT security to grow

    Security makes up 10 percent of overall IT operating budgets in 2008, up from 8 percent in 2007; trend to continue

  • Germany tightens data protection laws after scandals

    After a wistle-blower revealtions, the German authorities decided o find for themselves how easy it was managed to obtain personal information on consumers; government agents managed, in only a few days, to buy six million items of personal data — for just €850 euros ($1,230); the government decided that tightening of regulations was necessary

  • How to create the perfect fake identity

    If you have the patience and time, you can use “identity farming” to create the perfect fake identity; IT security maven Bruce Schneier writes that the ever more central role data — and data shadow — are playing in our lives now makes it possible

  • Virtualization is important for back up and recovery

    Server virtualization, that is, the separation of functionality from the underlying hardware, offers organizations many advantages in preparing for coping with and recovering from disasters, but it is not a panacea

  • D.C. tests interoperable public safety system

    Interoperability between radio and mobile Internet sought, and new technology — called Radio Over Wireless Broadband, or ROW-B — has the potential to save first responders time in an emergency

  • Cyber war fears grow after Georgia Web sites attacked

    Analysis of the attacks on official Georgia’s Web sites during and following the 8 August Russian incursion lead experts to suspect that rather than initiated by the Russian government, the attacks were the result of cyber “militias” or “hacktivists”; this is worrisome because it highlights the ability of small bands of hackers, let alone governments, to disrupt communication networks and critical infrastructure

  • Data breaches in U.S. already surpass 2007 total

    The number of reported data breaches in the United States has already surpassed 2007’s total; more states now require breach reporting; experts also say that the development of SQL injections made breaches much easier

  • Bay Area's FasTrak road tolls easy to hack

    Toll transponders can be cloned, allowing fraudsters to travel for free while others unwittingly foot the bill; more seriously, criminals could use the FasTrak system to create false alibis by overwriting one’s own ID onto another driver’s device before committing a crime

  • New system thwarts Internet eavesdropping

    The growth of wireless networks has increased the risk of eavesdropping on Internet communications; Carnegie Mellon researchers develop a low-cost system that can thwart these Man-in-the-Middle (MitM) attacks