IT Security

Right on bin Laden, analyst would use tweets to predict future

A company that called Osama bin Laden's death four hours before it was announced claims it can use tweets to predict the future, and has partnered with Twitter to prove it.

Commerce agency still offline 12 weeks after virus hits

A virus that hit the Economic Development Administration in January has forced employees to work by faxes, postal mail and phone calls ever since.

Hackers steal medical records on 181,000 from Utah server

The breach, apparently originating in Eastern Europe, took information on 181,604 Medicaid and CHIP recipients, including Social Security numbers for 25,000.

Employees who BYOD leave basic security behind, study finds

Fewer than half of personal devices used for work have basic security protections, and the numbers are even lower for smart phones and tablets, a new survey finds.

Botnet tracker locates zombies inside federal agencies

At FOSE, a system that depicts botnet infections, including within agencies, and other new products show that innovation is alive and well.

The untimely death of the advanced persistent threat?

The term advanced persistent threat has become a buzzword that many security pros prefer to avoid, but it remains a useful description of a serious threat.

CBP exposes contractor trade secrets in surveillance project

Customs and Border Protection took down documents included in a solicitation for the "virtual border fence" project that may have included proprietary contractor information.

Best defense? Start by admitting hackers will get in anyway.

In a security landscape that ranges from merely gloomy to extremely gloomy, you can't keep attackers out, but you can make sure it's not worth their while, experts said at the FOSE conference.

Organizations in dark as employees party on with BYOD

A SANS Institute study found that only 9 percent of organizations are "fully aware" of the personal mobile devices accessing their networks.

China's government is latest Anonymous victim

The hacker collective Anonymous is going after the Chinese government, posting messages on several local government websites protesting Internet restrictions in China.

Light at the end of the continuous-monitoring tunnel

Moving to a risk-management model of cybersecurity with continuous monitoring of systems can be difficult on a tight budget, but the savings can make it all worth the work.

What cloud computing needs to take the next step

Agencies and vendors need common definitions, performance metrics and security controls, say panelists at the FOSE 2012 conference.

Plan for dealing with insider threats getting close

The FBI and ODNI are leading the initiative to put together the pieces of a coherent national policy on insider threats. “No agency is starting from scratch.”

Keys to cyber defense: Internal info sharing, skilled staff

Federal agencies need to emphasize sharing security information between their various internal organizations to help facilitate network defense, panelists at FOSE said.

New in cloud: Brokers that let you select providers by the job

The emergence of cloud brokers can aid government agencies in purchasing cloud services and facilitate cross-platform integration and communication, industry experts say.

More from 1105 Public Sector Media Group