-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
-
Federal CISO: No contradiction between mobility and security
The need to prepare for disaster and the growing availability of technology have combined to promote telework — but is there a contradiction between mobility and security? New study says “no”
-
-
Lessons of Estonia: Ten steps to prepare for cyberwar
Two months ago Estonia came under a coordinated cyber attack; experts say the attack — and Estonia’s response — tell us how IT executives can prepare for the worst
-
-
Corporations demand enhanced cybersecurity
Chief information security officers want the high-tech industry to offer better security tools for their companies; these CISO have formed the Jericho Forum better to advance their case
-
-
New managed Web security system for a London borough
Web Security-as-a-Service (SaaS) is an emerging business model, and the London borough of Barnet calls on California-based ScanSafe to deploy its system for the council
-
-
Lawmakers unhappy with slow progress on emergency wireless project
The integrated wireless network (IWN) is one of the most expensive items among Justice’s information technology projects, but the department’s IG says it is at high risk of failure; Senators cut the program’s budget
-
-
Encryption specialist Voltage Security reports good results
The growing popularity of one of the company’s products — Voltage Security Network — proves the viability of security-as-a-service business model
-
-
Cumbersome federal acquisition rules an obstacle to IT flexibility
Cumbersome acquisition rules designed for building weapons systems and computing platforms are hampering adoption of rapidly evolving information technology networks
-
-
Messaging- and storage compliance technologies on the rise
More and more organizations deploy solutions which govern what employees can or cannot put into e-mails, instant messages, Web postings, and offline documents; trend moving beyond tightly regulated industries such as health care and financial services
-
-
Study reveals growing awareness of security among mobile employees
Cisco, which sponsored the study, says: “What’s key is knowing that the issues outlined in this study can be prevented”
-
-
Bugs found that can turn security tools against their users
Researchers find parser flaws that may cause defense-in-depth of corporate computers to backfire
-
-
FBI selects NCSA as host of new cybersecurity center
Bureau provides Fighting Illini cuber security center with $2 million to launch new National Center for Digital Intrusion Response
-
-
Pulses of light dramatically accelerate quantum computers
Wolverine researchers use pulses of light to accelerate quantum computers; important step for developing technology to foil national and personal security threats
-
-
APCO: 700 MHz proposal offers voice potential
The LMR is not dead yet: The FCC has approved dedicationg a portion of the 700 MHz band to public safety, trouble is, many in public-safety communications have been wary of IP-based voice technologies; APCO says the band can accommodate voice
-
-
Facebook posts source code on site by mistake
You would expect a site of the size and resources of Facebook not to fall victim to the most amateurish of programming errors, but it did; users who put a lot of personal data in their Facebook pages may want to reconsider
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.