NIST experts craft data removal handbook

If you follow instructions from the National Institute of Standards and Technology, you can rest assured that sensitive data you delete from obsolete computer hard drives and optical disks will not be recovered.

IG: Security at risk in EPA contract management system

During a five-month review in mid-2005, IG investigators at the Environmental Protection Agency found the Integrated Contract Management System was operating without up-to-date certification, accreditation and contingency plans.

ManTech lands Army network intrusion tech support deal

ManTech International Corp. won a five-year, $3.8 million contract from the Army to provide technical and analytical support to felony criminal investigations related to intrusions of Army networks.

DOD posts information assurance manual online

Defense contractors that provide information assurance services to the Pentagon can now review its training manual on the topic online.

DHS unveils master plan for border security

The Secure Border Initiative is the nation's first comprehensive attempt to gain control of the U.S. northern and southern borders.

Porn activity detected at DHS (maybe)

The Homeland Security Department's internal computer network generated 6.5 million security alerts that may be linked to employees accessing pornographic words or materials, according to the DHS inspector general.

DHS IT security smacked again

The Homeland Security Department's forlorn IT security came in for another pasting this month from the department's inspector general and from Sen. Judd Gregg (R-N.H.), chairman of the Senate Appropriations Subcommittee on Homeland Security.

Top 10 Web app security gotchas

Unvalidated inputInformation from Web requests is not validated. Attackers can use these flaws to attack back-end components.

Burden of proof

Identity rules may slow first responders, as well as interoperable communications

RFP Toolkit: Stand out in the crowd

Identity management systems can help agencies meet security mandates

Tech Success: Hackers exploit Web apps

New security solutions step into breach to secure government Web sites and those under development

Avaya and Juniper team for secure communications

Avaya Inc. and Juniper Networks Inc. will combine their IP telephony and IP networking and security expertise to provide a unified communications solution, company officials said.

OpenSSL gets NIST certifications

The National Institute of Standards and Technology has certified OpenSSL, an open-source library of encryption algorithms, as meeting Federal Information Processing Standard 140-2 Level 1 standards, according to the Open Source Software Institute.

GSA's eOffer bidding portal exptected to reopen today

The General Services Administration's electronic-bidding portal has been down since Jan. 11 due to a security flaw that allowed users of the system to change others' bids once they were logged onto the site.

Your guide for the year ahead

Washington Technology kicks off its 20th anniversary year not with a look back, but with a look forward. We've distilled the sea of policy issues, technology trends and emerging markets to the 20 that are ? or should be ? top of mind for systems integrators, IT services companies and resellers in the government market.

GSA seeks data about portable ID system

The General Services Administration is seeking information to help agencies meet identity credentialing standards under Homeland Security Presidential Directive 12 Federal Information Processing Standard 201.

Court reinstates OTI as e-passport RFID chip vendor

A federal judge has set aside the Government Printing Office's decision to eliminate On Track Innovations Ltd. from competing to provide radio-frequency identification tags for U.S. passport.

MSGI Security Solutions Inc. to complete purchase of AONet

New York company tries to grab more of the data recovery and secure storage market.

DOD to test contactless cards, readers

The Defense Department is setting up a lab to test contactless smart cards and readers for industry standard compliance and interoperability.

Web, security, wireless technologies rivet CIOs

A newly released survey of CIOs confirmed that Web issues and security, followed by wireless technologies, have held on to their positions as the leading technologies that concern federal IT professionals.