Cloud & Infrastructure

They send sensitive data to cloud, even if they don't trust security

A survey of managers finds that a majority have little or no knowledge of how their providers protect their data.

Cybersecurity

Mass. health authority uses ID software to prevent fraud

The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.

Cybersecurity

'Hit man' phishing scam makes an offer you can refuse

Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.

Cloud & Infrastructure

EPA contracts support aggressive move to cloud computing

The Environmental Protection signs contracts that will help meet its goal of having 80 percent of its computing in the cloud by 2015.

Cybersecurity

Federal ID cards: Iris imaging in, fingerprint swiping out

NIST proposed new options for using iris recognition as an alternative to fingerprints in federal Personal Identity Verification.

Cybersecurity

3 free tools to help manage your passwords

Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.

Cybersecurity

Like it or not, password management is a must

As more of our life moves online we still are looking for an identity management scheme that is practical, secure and scalable. Don't hold your breath.

Cybersecurity

Yahoo hack: Strong passwords don't have to be hard

The theft of Yahoo passwords, including those of government users, highlights the problem with weak authentication. But it doesn’t have to be that way.

Cybersecurity

PIV card specs to account for mobile, other new factors

Proposed changes in FIPS 201 reflect changes in the technology and environment in which the federal PIV cards for government workers and contractors are used.

Cybersecurity

Sykipot variant, exploiting Microsoft vulnerability, targets aerospace industry

The information-stealing Trojan attacks the recently discovered flaw in XML Core Services, as well as Flash Player, and might be coming from China.

Cybersecurity

Analysis of social site hack: Are risks too great for gov workers?

Imperva's reconstruction of the MilitarySingles hack shows the inherent risks of user-generated content and asks if government needs a "higher standard" for social networking.

Cybersecurity

Report: Attacks on gas pipeline networks linked to RSA hack, China

Digital signatures used in the spear-phishing campaign against the natural gas industry are identical to those used in the RSA breach, according to a published report.

Cybersecurity

9 keys to making BYOD work

Employees will use personal mobile devices for work anyway; here are tips on making sure it's done right.

Cybersecurity

New spec lets any mobile device swap biometrics

New protocols sponsored by the National Institute of Standards and Technology, the FBI and the Homeland Security Department would make biometric technology interoperable and easier to use.

Cloud & Infrastructure

Decisions on cloud 'all about the data,' USPS security officer says

Agencies should only deal with what they can tolerate as a risk, the U.S. Postal Service's Chuck McGann tells a FedScoop audience.

Emerging Tech

WWI 'dazzle paint' fools face recognition scanners

An artist finds that the same approach used in World War I to confound the rangefinders on attacking ships will prevent a facial scanner from recognizing you.

Cybersecurity

Targeted attacks, mobile vulnerabilities on the rise, report states

Criminals continue to exploit old vulnerabilities as enterprises, and users fail to keep up with the flood of security updates, the latest Symantec report states.

Cybersecurity

90 percent of 'secure' HTTPS sites are vulnerable, study finds

A nonprofit initiative to check on SSL implementations finds that 75 percent of those sites are vulnerable to a BEAST attack, and only 10 percent are secure.

Cybersecurity

Conficker returns, exploiting weak passwords on network systems

Infections by the persistent worm, which takes advantage of weak or shared passwords or stolen login tokens, rose in 2011, Microsoft says.

Cybersecurity

For some hacks, everything old is new again

A cybersecurity report from Hewlett-Packard highlights the prevalence and persistence of coding errors, vulnerabilities and exploits that should have been corrected long ago.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.