-
UPDATE: NNSA chief fired for Los Alamos security lapses
Linton Brooks gets the axe after a series of breaches expose the weakness of lab cyber-security; failure to do away with removable storage devices in weapons-related computers cited; Energy Department starts the hunt for a replacement
-
-
Netcentrics teams with L3 to secure Army HQ's computers
Virginia company deploys a enterprise-wide common cryptographic log-in using common access cards; effort part of the Information Management Center project
-
-
Cybercrooks use "KGB-style" recruitment tactics
Phishers and hackers are infiltrating university clubs; greed a prime motivator for students; liberal arts majors trained to become sleeper cells
-
-
White papers sought to describe the human factor in cyber-insecurity
Cyber Security Knowledge Tranfer Network offers £50,000 to winning “human factors working group”; understanding how phishers and hackers exploit psychology a critical endeavor; winning applicants will devise a method that raises awareness, has little cost, and builds demand for cybersecurity products
-
-
GTSI completes Navy's Prometheus project
$15 million success shows GTSI is back in the saddle after earlier disappointments; effort secured Navy networks against an exponential rise of cyber attacks
-
-
AirDefense sensors to be deployed in FAA LAN security project
Contract won by Simplex Data Solutions will result in the deployment of hundreds of AirDefense wireless sensors; latter company flies high after receiving $14 million in second round funding
-
-
SmartTECH to market Akoura's DataSecure software in India
DataSecure’s clever “obfuscation technology” disguises senstive data as commonplace files; unauthorized users are welcomed into the system, but once there they find nothig of value; “cryptographic data store” hides secure information from the operating system so normal and embedded files look the same on the Properties menu
-
-
Cisco survey finds federal executives confident of security efforts
Decision-makers spending more time with manadated security requirements than in recent years; half believe software automation tools will be dominant in the near future; the possibility of reduced operations and security delivery due to security breaches are main areas of concerns
-
-
New study examines government executive perceptions of IPv6 market
Less than a majority expect IPv6 compliance to significantly impact IT purchases; government seen as critical driver of commercial development; federal transition office desired
-
-
U.S. Army in tests of Nokia communication gear
The U.S. Army is interested in a host of communication technologies — WiMAX, WCDMA 3G, GSM — and has signed an R&D agreement with Nokia to test and demonstrate the applicability of these technologies for C3I purposes
-
-
Vigilon opens operation center in Chicago
The State of Illinois is actively seeking homeland security and business continuity companies; the latest to embrace the Windy City is Israeli enterprise security specialist Vigilon, which opens an operation center in Chicago
-
-
Preventing cyberspace gap
Secretary of the Air Force reflects on cyberspace dominance, the information mosaic, and the future of precision strikes
-
-
DHS 2007 R&D budget declines by 22 percent
DHS FY 2007 R&D budget declines overall by about one-fifth, but three areas see increases — cybersecurity, interoperable communications, and radiological and nuclear measures
-
-
NSF funds cybersecurity education
As cybercrimes grow, so does the need for cybersecurity mavens; the NSF gives the University of Pittsburg $1 million to train students in cybersecurity
-
-
Keeping messages over the Internet secure by making them faint
Wireless and Internet communication is vulnerable to eavesdropping and theft; traditional methods of keeping messages secure — encryption and scrambling — may be expensive to implement; two Princeton researchers suggest a new technique to keep transmissions safe, a technique which relies on the properties optical-fiber networks
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.