IT Security


NARA gets OMB directive: oversee revamping of fed records management

Records management framework will be based on cloud architecture, secure storage and analytical tools, according to an Office of Management and Budget directive.

Zero-day exploit hits Java – should you just turn it off?

The flaw in the ubiquitous programming language is being exploited with the Poison Ivy RAT from servers in China and might not be patched until October.

Why 15 = 5x3 is a major quantum breakthrough

Researchers for the first time use a solid-state quantum processor in prime factoring (and get it right half the time), which could eventually have a big impact on security.

Is it data or deception? US-VISIT needs to know.

Of all immigrants coming into the United States, about 825,000 fingerprint records at US-VISIT have multiple names and inconsistent birth dates.

How CDC's research cloud went virtual

After consolidating its servers CDC's research lab laid the foundation for managing a virtual infrastructure.

‘Internet in a room’ simulates attacks against large networks

Iowa State's Information Assurance Center's test bed simulates complex networks and cyberattacks, making it a trusted source for information on the reliability and effectiveness of security products.

OT, meet IT (please)

If industrial control systems are running Windows, they're vulnerable to hackers. But can engineers handle that?

The grace period on mobile security is over

As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.

Security weaknesses 'pervade' EPA systems, audit finds

Lack of an overall information security policy has resulted in pervasive weaknesses in the agency's security.

DARPA's Plan X: Cyber warfare on autopilot

The classified program is looking to develop automated tools for cyber defense and attack.

FBI to open facial recognition searches to police nationwide

A pilot project that started in Michigan will give police in in several states access to a database of nearly 13 million mug shots.

Software in some FDA laptops tracks employees’ activities

Reportedly concerned about unauthorized disclosures, FDA officials installed monitoring software on some scientists’ laptops. The scientists say the action is in retaliation for blowing the whistle.

One way to manage BYOD: Limit the options

Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.

Gauss malware, Apple iPhone show what encryption can do

Agencies wondering whether to encrypt their data or mobile devices should take note of the trouble encryption is giving security researchers and the worries it gives the Justice Department.

Audit finds some holes in NASA's cybersecurity center

The Inspector General says the consolidated Security Operations Center has improved its security but still has some key vulnerabilities.