Hacker penetrates USDA database

Secretary Mike Johanns alerted employees in the Washington area that a hacker broke into a database at headquarters and may have stolen the names, Social Security numbers and photos of about 26,000 current and former workers and contractors.

Cyberprotection takes center stage

A year ago, an IT critical infrastructure list circulating in Washington included the headquarters of Intel Corp. and Microsoft Corp. Today, the list is more likely to include virtual assets such as networks that carry data to and from major power plants, government offices and Wall Street.

Feds to deploy field offices in future disasters

Federally operated joint field offices will play a significant role in managing response following future natural disasters and other major incidents or attacks, according to several new documents released by the Homeland Security Department.

DHS runs TOPOFF 4 readiness exercise

The Homeland Security Department has launched a simulation of terrorist incidents on the national capital region and a West Coast city, in a tabletop exercise that began yesterday and is set to continue through Thursday.

VA accelerates privacy, security training

The Veterans Administration is making key technical and policy changes following the recent theft of sensitive data on 26.5 million veterans.

Vendors, agencies struggle with HSPD-12

Recent surveys signaled just how much vendors and agencies are struggling to implement Homeland Security Presidential Directive-12.

Entrust buys Orion Security Solutions

Entrust Inc. has acquired Orion Security Solutions, a supplier of public key infrastructure services, for $8 million cash.

IT professionals explore Microsoft Vista's security

Microsoft executives weathered a flurry of questions from government officials about the security features in its next-generation operating system.

CALEA ruling could have adverse impact for VOIP

Efforts to apply federal wiretap laws to Internet traffic could have unintended consequences for IT security, an industry association warns.

GPO issues solicitation for a smart card facility

The Government Printing Office plans to issue a solicitation for a vendor that can establish a repository that will manufacture, personalize and issue Personal Identity Verification cards for smaller agencies.

The trifecta for secure data

Hackers, cyberterrorists and thieves are not the only ones from whom agencies need to protect their computer networks and data. As officials from the Department of Veterans Affairs can attest, critical information needs to be secured internally as well.

Cole calls for holistic approach to IT security

Eric Cole of Lockheed Martin suggests that organizations put far more effort into identifying vulnerabilities and securing them as the only effective way to protect against multiplying threats, as well as fully integrate security into every layer of organizational IT.

Souped-up grant programs target port security

As Congress prepares to approve increased funding for port security grants, contractors said the money is likely to pay for more comprehensive surveillance, domain awareness and information-sharing IT systems which, in many cases, systems integrators are installing.

VPNs wanted, but which kind?

Many government agencies, if they have not already done so, soon will face the issue of what technology they should use to connect remote workers, and they'll be looking to integrators to help make a decision.

Code warriors battle on

Today more than ever before, government agencies need to protect important data from those who would try to steal it. Encryption is the key.

When in Rome ?

When asked to offer his finger or palm for a biometric vein scan, Claudio Casuccio balks. "That's looking inside your body," Casuccio said. "It is very invasive, in my opinion." His view underscores the cultural differences that can arise as companies take their biometric solutions around the globe.

Industry: Major overhaul of clearance process needed

Industry is uring Congress to intervene in the crisis regarding the Defense Department's cancellation of processing security clearances and proposed a legislative overhaul of the granting procedure.

Report: Real-time locating systems come of age

Real-time locating systems are growing rapidly and could be a major part of the radio frequency identification market within 10 years, according to a new report.

TWIC competition back on track

The Transportation Security Administration has announced it will conduct a "full and open competition" for all aspects of the Transportation Worker Identity Card project, including enrollment and data management services.

Fingerprint vendors trip over NIST test results

Federal government testing of digital fingerprint interoperability has evolved into an eligibility test for the federal employee identification card initiative, industry executives said.