-
-
Cyber Storm drill under way
Nation-wide (indeed, international) cybersecurity drill under way
-
-
State of federal-state cybersecurity cooperation unsatisfactory
There is a lot of talk about the need for greater federal-state cooperation on cyber security, but much is still to be done
-
-
-
Big cybersecurity vendors join to combat spyware
The big hitters in the cybersecurity industry are teaming up to fight spyware, but small spyware companies are worried
-
-
DHS, private industry in national IT emergency exercise
Most of the nation’s critical infrastructure is privately owned including the communication infrastructure, so DHS is going to test government-private industry coordination in the event of emergency
-
-
DHS WAN susceptible to service disruptions
DHS IG says department WAN susceptible to disruption and data loss
-
-
Metrics: Money allocated to security grows
Motivational speakers accentuate the positive, but fear is also a great motivator — just see what countries and companies are planning to spend on defense this year
-
-
IDS shows biometric identification system with proprietary 384 Bit algorithm
Biometrics company combines finger-print recognition with 384 Bit security and touts the superiority of finger printing over other forms of biometric identification
-
-
DHS beefs up cybersecurity budget
Cybercrime reaches record level and shows growing sophistication; DHS beefs up its cybersecurity efforts, even as state and local cybersecurity officials say not enough is done to coordinate federal-state cyber defense efforts
-
-
DHS to tighten security of information included in national infrastructure plan
Infrastructure and IT companies are supposed to provide DHS with information to help fashion an effective infrastructure protection policy; these companies are worried about who would have access to that information
-
-
Protecting data over wide-area networks
For business to recover from disaster it has to have its data and applications protected; to do that effectively, both hardware and software encryptions are required, and both transmitted information and stored information should be proected
-
-
-
DHS buys 150,000 Camouflage CyberKeys
You can take it with you: DHS buys a nifty little device to help its work force be mobile and secure at the same time
-
-
Identity Systems shows upgraded identity search-and-match solution
Businesses are becoming more aware of the need to know exactly who their clients, suppliers, and employees are, so the upgrade to an already-popular search and identify solution will be welcomed
-
More headlines
The long view
Our Online World Relies on Encryption. What Happens If It Fails?
Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.