-
IT spending worldwide to rise to $1.48 trillion by 2010
More and more is being spent on IT: In 2006 organizations and consumers spent $1.16 trillion, and during the next thee years this number will grow at a CAGR of 6.3 percent
-
-
UPDATE: NNSA chief fired for Los Alamos security lapses
Linton Brooks gets the axe after a series of breaches expose the weakness of lab cyber-security; failure to do away with removable storage devices in weapons-related computers cited; Energy Department starts the hunt for a replacement
-
-
Netcentrics teams with L3 to secure Army HQ's computers
Virginia company deploys a enterprise-wide common cryptographic log-in using common access cards; effort part of the Information Management Center project
-
-
Cybercrooks use "KGB-style" recruitment tactics
Phishers and hackers are infiltrating university clubs; greed a prime motivator for students; liberal arts majors trained to become sleeper cells
-
-
White papers sought to describe the human factor in cyber-insecurity
Cyber Security Knowledge Tranfer Network offers £50,000 to winning “human factors working group”; understanding how phishers and hackers exploit psychology a critical endeavor; winning applicants will devise a method that raises awareness, has little cost, and builds demand for cybersecurity products
-
-
GTSI completes Navy's Prometheus project
$15 million success shows GTSI is back in the saddle after earlier disappointments; effort secured Navy networks against an exponential rise of cyber attacks
-
-
AirDefense sensors to be deployed in FAA LAN security project
Contract won by Simplex Data Solutions will result in the deployment of hundreds of AirDefense wireless sensors; latter company flies high after receiving $14 million in second round funding
-
-
SmartTECH to market Akoura's DataSecure software in India
DataSecure’s clever “obfuscation technology” disguises senstive data as commonplace files; unauthorized users are welcomed into the system, but once there they find nothig of value; “cryptographic data store” hides secure information from the operating system so normal and embedded files look the same on the Properties menu
-
-
Cisco survey finds federal executives confident of security efforts
Decision-makers spending more time with manadated security requirements than in recent years; half believe software automation tools will be dominant in the near future; the possibility of reduced operations and security delivery due to security breaches are main areas of concerns
-
-
New study examines government executive perceptions of IPv6 market
Less than a majority expect IPv6 compliance to significantly impact IT purchases; government seen as critical driver of commercial development; federal transition office desired
-
-
U.S. Army in tests of Nokia communication gear
The U.S. Army is interested in a host of communication technologies — WiMAX, WCDMA 3G, GSM — and has signed an R&D agreement with Nokia to test and demonstrate the applicability of these technologies for C3I purposes
-
-
Vigilon opens operation center in Chicago
The State of Illinois is actively seeking homeland security and business continuity companies; the latest to embrace the Windy City is Israeli enterprise security specialist Vigilon, which opens an operation center in Chicago
-
-
Preventing cyberspace gap
Secretary of the Air Force reflects on cyberspace dominance, the information mosaic, and the future of precision strikes
-
-
DHS 2007 R&D budget declines by 22 percent
DHS FY 2007 R&D budget declines overall by about one-fifth, but three areas see increases — cybersecurity, interoperable communications, and radiological and nuclear measures
-
-
NSF funds cybersecurity education
As cybercrimes grow, so does the need for cybersecurity mavens; the NSF gives the University of Pittsburg $1 million to train students in cybersecurity
-
More headlines
The long view
Our Online World Relies on Encryption. What Happens If It Fails?
Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.