Twenty of 24 federal agencies are investing about $1 billion in public key infrastructure activities, but challenges to PKI projects remain, according to a General Accounting Office report released this month.
A team of companies led by a Lockheed Martin Corp. subsidiary is building a tool to help the intelligence community keep tabs on the spooks behind its firewalls.
Microsoft Corp. today announced rewards of $250,000 each for the arrest of the writers of the SoBig and Blaster worms that attacked millions of computers running the company's Windows operating systems earlier this year.
Researchers at the National Institute of Standards and Technology have developed an alternative way of authenticating users that they claim is easier to use than passwords.
A decision by Massachusetts to shift to open-computing standards and consider open-source software as part of that strategy has many software companies concerned about their future business with the state.
Rep. Tom Davis, R-Va., is asking whether the General Services Administration's e-authentication initiative will be completed by March, and how the project's delays are affecting other e-government initiatives.
The House of Representatives passed the Government Network Security Act of 2003, which requires executive branch departments and agencies to protect government computers and information from the risks posed by peer-to-peer file sharing programs.
The software certification role of the National Information Assurance Partnership might expand from defense and national security agencies to all federal agencies, a White House official told Congress.
The exchange of information between the Defense and Homeland Security departments is essential to national security, but the departments still are struggling to share information within their organizations, government officials said Oct. 22 at the Federal Information Assurance Conference at the University of Maryland in College Park.
New worms are becoming more efficient and the window between exposure of a vulnerability and the appearance of an exploit is shrinking, according a new Internet security report.
In an effort to better protect personal data collected by the federal government, the Office of Management and Budget orders privacy assessments on all new IT systems and those undergoing major changes.<br>
Proposed legislation would require federal agencies to protect their computers and information from the security risks of peer-to-peer file sharing programs.
The Common Criteria for security software evaluation are not a panacea for assuring government IT systems, government and industry officials told a House panel Sept. 17.
A report released today by a team of cybersecurity professionals condemns the ubiquity of Microsoft Corp. software as inherently insecure and called for government to break the software giant's dominant grip on the market.