Can encryption stop the ‘balkanizing’ of the Internet?

Countries and companies around the globe are weighing if they should keep data within their own borders. Does that help or hurt the continued growth of the Internet?

Critical Mozilla vulnerability discovered

Researchers at Intel Security announced yesterday they have uncovered a critical vulnerability in the Mozilla Network Security Services (NSS) crypto library that could allow malicious parties to set up fraudulent sites masquerading as legitimate businesses and other organizations.

White hat hackers try breaching Healthcare.gov, find ‘critical vulnerabilities’

White hat hackers within the Department of Health and Human Services’ Office of the Inspector General set out to test the integrity of Healthcare.gov security earlier this year and found critical vulnerabilities, according to an IG report released Tuesday.

Halvorsen clarifies DOD’s cloud, mobile plans

The Defense Department is drafting plans that will give the military services the authority to contract for their own cloud services using a soon-to-be-developed common business case analysis template, the Pentagon’s acting Chief Information Officer Terry Halvorsen confirmed Tuesday.

Mobile users frequently sacrifice security for increased productivity

More than a third of federal workers within the next year will use mobile devices exclusively to complete their daily work and many acknowledge their organizations frequently sacrifice security for the productivity enhancements that mobility provides, according to a new survey from the Ponemon Institute.

Reinventing the FBI: The Comey vision

James B. Comey is only the seventh director in FBI history. And with only a year on the job, he is spearheading a quiet revolution in how the 106 year-old institution recruits, trains, organizes and develops its leadership.

Healthcare.gov hearing reveals user data was disclosed

The recent breach a Healthcare.gov test server might not have put users’ personal information at risk, but a congressional oversight hearing Thursday revealed that early glitches during the site’s launch did.

The FTC’s expanding cybersecurity influence

As the Department of Homeland Security awaits public comments on its voluntary framework initiative—due Oct. 10—the Federal Trade Commission has been making an aggressive push to expand its authorities and force companies that have lax security programs to bolster their defenses.

Global security association helps translate NIST framework

The Information Security Forum, a U.K.-based association of leading companies from around the world, released a “mapping” document Monday that for the first time helps companies that currently use the ISF’s standard of good practice—known simply as the standard—to guide their information security programs to know if they are in compliance with the U.S. National Institute of Standards and Technology’s cybersecurity framework.

OPM to cut ties with security clearance contractor

The federal Office of Personnel Management plans to end the government’s relationship with U.S. Investigations Services LLC, the security clearance contractor that suffered a major cyberattack last month leading to the compromise of personnel records belonging to more than 25,000 federal employees.

Did Apple just make itself the biggest target in the world?

By introducing its new mobile wallet technology with the iPhone 6, Apple may have single-handedly blunted the attacks targeting retail point-of-sale systems. And by doing so, the company may also have made itself the biggest target in the world for cybercriminals.

GSA picks Valiant for enterprise IT security contract

The General Services Administration this week awarded Valiant Solutions a $33 million contract to serve as the agency’s first line of enterprisewide defense against cyber attacks.

Rogers sets course for a new era at NSA

His first 100 days as the new director of NSA now complete, Admiral Michael Rogers has planted a series of clear navigation beacons for his employees to follow as they seek to move beyond the Edward Snowden era. And he’ll be damned if one outlaw leaker and a handful of journalists are allowed to write the final chapter of NSA’s storied history.

Standard password protection is dead

With 1.2 billion new passwords stolen, feds should finally consider abandoning standard password protection.

DHS, FBI investigating contractor hack

Federal law enforcement authorities are investigating a hacking incident at a contractor responsible for conducting background investigations for the Department of Homeland Security. Company officials said cybersecurity experts believe the intrusion “has all the markings of a state-sponsored attack.”

NIST announces details of second privacy workshop

NIST is planning to host its second privacy engineering workshop, aimed at providing guidance to privacy engineers who handle personal information.

Is NSA’s PRISM program ruining cloud computing’s growth?

The New America foundation said U.S.-based cloud computing companies are already starting to lose market share due to the NSA spying scandal.

Commerce IG: NOAA needs to better protect its satellite data

A Commerce Department report says NOAA has had data breaches from satellite programs in the past few years.

HHS identity card systems pose security risks

Nearly a decade after a presidential directive mandated that agencies adopt a common personal identification standard for federal employees and contractors, compliance with the directive at the Department of Health and Human Services remains inadequate, subjecting the department to several categories of risk, according to a report released by HHS’s Office of the Inspector General last week.

Significant national security challenges remain 10 years after 9/11 commission report

A decade after the 9/11 Commission issued its final report on the Sept. 11, 2001 terrorist attacks against the United States, the threat from global terrorism may be more pronounced than ever, with major new vulnerabilities emerging in cyberspace and a Congressional homeland security oversight system plagued by duplication and turf battles.

Page 1 of 361 2 3 4 36