NAS investigates networking security legal solutions

A possible solution to computer security vulnerabilities may be to widen the scope of parties that could be held liable for the damage they do, according to a report from the National Academy of Sciences.

Integrator Toolbox: Don't skimp when it comes to backing up

There are few things more critical to an IT department than having a good, thoroughly tested backup and disaster recovery program.

DOD to set wireless policy

<FONT SIZE=2>The Defense Department CIO is expected to sign a policy next month that will set guidelines for using wireless devices across the department. The new policy will revise the Pentagon Area Common IT Wireless Security Policy signed last fall, said Dawn Meyerriecks, chief technology officer for the Defense Information Systems Agency. DOD users and vendors should find the departmentwide policy more comprehensive than the Pentagon policy, she said. </FONT>

Infotech and the Law: Homeland security -- Who pays for protecting infrastructure?

<FONT SIZE=2>In February, the White House issued the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, which describes the work needed in each industry sector to secure the nation's physical resources against the threat of terrorism.</FONT>

NSA certification in works

<FONT SIZE=2>The National Security Agency plans to require a new credential of its staff and contractors working in information security. </FONT>

Weakness endangers Net e-mail, patches available

Patches to fix what is being called a critical vulnerability in the world's most popular e-mail transfer agent, open-source and commercial versions of Sendmail Mail Transfer Agent, are available.

NSA, (ISC)2 creating new information security certification

The National Security Administration plans to require a new credential of its staff and contractors working in information security.

Rainbow wins $60 million encryption contract

Rainbow Technologies has won a contract from the National Security Agency to provide high security encryption modules to federal agencies.

The business end of bioterror

<FONT SIZE=2>Government health departments will be among the largest purchasers of homeland security solutions at the state and local level as the nation struggles to develop the capability to respond to biological terrorist attacks.</FONT>

State begins secret Spectrum work

<FONT SIZE=2>The State Department is moving to strengthen its global telecommunications network, as a looming war and threatened terrorist attacks create an urgent need for reliable communications.</FONT>

States take step toward sharing cyberthreat data

Thirteen states conducted a communications exercise last weekend that could lead to a new, multistate information sharing and analysis center.

Industry will work with government on cyberspace plan

The National Strategy to Secure Cyberspace details dozens of steps for industry and government to take to fend off and recover from assaults on the nation's critical systems.<br>

Integrators in cybersecurity

<FONT SIZE=2>When his phone rang after midnight Saturday, Jan. 25, Brian Dunphy knew it was trouble. On the phone was the night crew at Symantec Corp.'s Security Operations Center in Alexandria, Va., giving Dunphy, a senior manager at the center, a heads-up that the Slammer worm had begun to attack servers around the world.

TSA screener work hits $700M

<FONT SIZE=2>The Transportation Security Administration's effort to put federal screeners at every U.S. airport exceeded its contract by nearly $600 million, according to a new report.</FONT>

Homeland security gets top billing in budget

President Bush is making homeland security the top priority in his fiscal 2004 budget request to Congress, and promises intense scrutiny of how the funds are spent.

Clarke leaving cybersecurity post next month

Richard Clarke, the White House cybersecurity czar, will resign after he finishes the National Strategy to Secure Cyberspace early next month. He said it is essential to the health of the nation's economy and security that the national strategy is implemented.

Better patch management could have slowed Slammer

The worm that slowed Internet traffic over the weekend didn't come as a complete surprise, Symantec Corp.'s president says.

Contractors making gains at mapping agency

The National Imagery and Mapping Agency is increasingly relying on contractors to supply both employees and technology, its director, retired Air Force Lt. Gen. James R. Clapper Jr., said today.

DOD taps SSP for digital identity authentication

SSP Solutions Inc. has received orders totaling $4.8 million from the Department of Defense for digital identity authentication, administration and authorization software and firmware.

What's hot in 2003?

<FONT SIZE=2>These are the markets that spurred companies to make acquisitions, restructure operations and invest new resources. Here's where IT executives expect to make money.</FONT>