A possible solution to computer security vulnerabilities may be to widen the scope of parties that could be held liable for the damage they do, according to a report from the National Academy of Sciences.
<FONT SIZE=2>The Defense Department CIO is expected to sign a policy next month that will set guidelines for using wireless devices across the department. The new policy will revise the Pentagon Area Common IT Wireless Security Policy signed last fall, said Dawn Meyerriecks, chief technology officer for the Defense Information Systems Agency. DOD users and vendors should find the departmentwide policy more comprehensive than the Pentagon policy, she said. </FONT>
<FONT SIZE=2>In February, the White House issued the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, which describes the work needed in each industry sector to secure the nation's physical resources against the threat of terrorism.</FONT>
Patches to fix what is being called a critical vulnerability in the world's most popular e-mail transfer agent, open-source and commercial versions of Sendmail Mail Transfer Agent, are available.
<FONT SIZE=2>Government health departments will be among the largest purchasers of homeland security solutions at the state and local level as the nation struggles to develop the capability to respond to biological terrorist attacks.</FONT>
<FONT SIZE=2>The State Department is moving to strengthen its global telecommunications network, as a looming war and threatened terrorist attacks create an urgent need for reliable communications.</FONT>
The National Strategy to Secure Cyberspace details dozens of steps for industry and government to take to fend off and recover from assaults on the nation's critical systems.<br>
<FONT SIZE=2>When his phone rang after midnight Saturday, Jan. 25, Brian Dunphy knew it was trouble. On the phone was the night crew at Symantec Corp.'s Security Operations Center in Alexandria, Va., giving Dunphy, a senior manager at the center, a heads-up that the Slammer worm had begun to attack servers around the world.
<FONT SIZE=2>The Transportation Security Administration's effort to put federal screeners at every U.S. airport exceeded its contract by nearly $600 million, according to a new report.</FONT>
President Bush is making homeland security the top priority in his fiscal 2004 budget request to Congress, and promises intense scrutiny of how the funds are spent.
Richard Clarke, the White House cybersecurity czar, will resign after he finishes the National Strategy to Secure Cyberspace early next month. He said it is essential to the health of the nation's economy and security that the national strategy is implemented.
The National Imagery and Mapping Agency is increasingly relying on contractors to supply both employees and technology, its director, retired Air Force Lt. Gen. James R. Clapper Jr., said today.
SSP Solutions Inc. has received orders totaling $4.8 million from the Department of Defense for digital identity authentication, administration and authorization software and firmware.
<FONT SIZE=2>These are the markets that spurred companies to make acquisitions, restructure operations and invest new resources. Here's where IT executives expect to make money.</FONT>