Heute 73

Gestern 527

Insgesamt 39694607

Samstag, 23.11.2024
Transforming Government since 2001

Sicherheit

  • USA: Evans: 'People are losing data'

    Between July and Sept. 30, agencies reported 338 separate security incidents involving personally identifiable information to the Office of Management and Budget, Karen Evans, OMB’s administrator for e-government and information technology, said today.

    Many of the incidents, however, are not attacks on government information from outsiders, Evans said in a speech at the IT Association of America’s annual Chief Information Security Officer Workshop in Falls Church, Va.

  • USA: Evans: Agencies are improving security profiles

    Agencies continue to make progress in securing their information systems, at least in terms of improving their collective FISMA scores, according to Karen Evans, the Office of Management and Budget’s administrator of e-government and IT. Evans was the keynote speaker at the ITAA 2006 Information Security Workshop today in Falls Church, Va.

    FISMA — the Federal Information Security Management Act — sets the standards and procedures agencies must observe in order to improve their security profiles. Each year, every department and independent agency is given a letter grade, based on their implementation of the elements of FISMA.

  • USA: Federal government earns a collective D+ on FISMA scorecard

    The federal government as a whole continues to struggle with securing its computer networks, according to the latest round of FISMA grades released today by the House Government Reform Committee.

    Agencies earned an overall D+ for their efforts, the same grade as last year. Ten agencies improved their marks while 8 slipped.

  • USA: Feds Again Flunk Network Security

    For the fourth consecutive year, a large percentage of federal agencies flunked their annual network security review under the Federal Information Security Management Act (FISMA), including the Department of Homeland of Security (DHS) and the Department of Defense (DOD).

    Out of 24 reporting agencies, 13 either scored an F or a D in the annual report card scores required under FISMA.

  • USA: Feds Again Score Low on IT Security

    Overall grade stays at D+; execs say complexity works against compliance

    A congressional committee last week released a report card giving the federal government an overall grade of D+ on computer security for the second year in a row -- a rating that prompted harsh words from some lawmakers but also sparked a debate over how useful the grading process is.

    At a hearing on Thursday, members of the House Committee on Government Reform lectured IT executives from the Pentagon and the U.S. Department of Homeland Security about the failing cybersecurity scores that the two agencies received as part of the panel's annual evaluation. "I don't feel comfortable that my homeland is secure," said Rep. Diane Watson (D-Calif.).

  • USA: Feds Look to Clear Hurdles in Private-Sector Cybersecurity

    The notion that the government needs to establish firm and far-reaching partnerships with the private sector has become a key focus of the debate currently raging over federal cybersecurity.

    Given that the private sector owns and operates between 80 percent and 90 percent of the nation's digital infrastructure, the military and civilian agencies realize that they can't go it alone in the face of ongoing and persistent threats from a multiplicity of attackers both at home and abroad.

    The catch phrase, a mainstay in nearly every blueprint for federal cybersecurity, is "public-private partnerships."

  • USA: Government Auditors Urge Clearer Cybersecurity R&D Strategy

    The government needs better leadership and more cohesive direction on cybersecurity R&D, according to a new report from the Government Accountability Office.

    The federal government needs to do more to come up with a comprehensive strategy for funding and carrying out research and development of new cybersecurity technologies, according to a new report by the Government Accountability Office.

    Cybersecurity R&D is currently a multi-headed set of initiatives within government. The report lists, in addition to the breadth of executive agencies, 14 different organizations involved in oversight and coordination of cybersecurity R&D, with various hands in a dizzying array of pots, and five agencies actually funding and conducting most of the government's cybersecurity R&D.

  • USA: Government Computers Still Exposed

    Agencies describe bug-patching problems that render systems vulnerable to cyberattack.

    Government agencies are spending billions on technology for homeland security, yet system vulnerabilities are increasing exponentially, agency representatives told a Congressional panel this week.

  • USA: Government IT security: Better than some, but could use work

    Security awareness is good among government workers, and security practices in government workplaces often are better than in their private-sector counterparts, according to a recent study by RSA Security.

    But there still is room for improvement, the survey found. Although 92 percent of government respondents had received security training, compared to 69 percent in the private sector, 34 percent of them reported that at times they felt they had to circumvent security policies to get their job done, a statistical dead heat with those in private enterprises.

  • USA: Government releases specs for security checklists

    The National Institute of Standards and Technology and the National Security Agency have released a specification to standardize IT security checklists.

    NIST and NSA collaborated with representatives from industry to develop the Extensible Configuration Checklist Description Format (XCCDF) as a way to provide a uniform format for security checklists, benchmarks and other configuration guidance.

  • USA: Government, Not Vendors, Must Lead In Securing Federal IT

    No doubt the IT security industry has a lot of knowledge to share with the federal government to help secure government IT systems and Web sites. With near-failure grades on IT security scorecards, the feds need the assistance.

    One approached died last week when the federal CIO Council withdrew its support from the CISO Exchange, a privately run group chaired ostensibly by senior government IT officials. The way the CISO Exchange worked, six companies willing to fork over $75,000 could join the Exchange’s exclusive advisory board comprised of leading federal CIOs and chief information security officers. Other vendors, with smaller contributions, would have had some, but more limited access to these officials. The arrangement smacked of pay to play, and the Exchange’s initial cheerleader in Congress, House Government Reform Committee chairman Tom Davis, vacated his earlier, enthusiastic endorsement.

  • USA: House Passes National Defense Authorization Act

    House Democrats have secured passage of an amendment to the defense authorization bill that would establish a formal cybersecurity office in the White House and update federal compliance requirements for securing electronic data.

    On Friday, the House passed the National Defense Authorization Act by a vote of 229 to 186, which included an amendment co-authored by Reps. Diane Watson (D-Calif.) and Jim Langevin (D-R.I.) that achieved many of the provisions outlined in separate pieces of legislation introduced earlier by the lawmakers.

  • USA: Identity Self-Defense: The Power of PIV

    Identity protection is one of the most pressing topics within our society. Over the course of the last few years, we have seen numerous stories reported where information systems have been compromised and data has been lost potentially compromising the identity of millions. While we could debate the level of security required to properly protect any information system, I believe there is a more fundamental approach to addressing this critical issue. Identity self-defense.

    In the months following the September 11 attacks on New York and Washington D.C., it was determined the issue of identity verification needed to be addressed. Homeland Security Presidential Directive 12 (HSPD12) established the requirement to verify the identity of all federal employees and issue them a secure identity credential. This has resulted in the issuance of millions of Personal Identity Verification (PIV) credentials.

  • USA: Is Government Paying Enough Attention To Application Security?

    Even as a consistent number of system vulnerabilities blemish federal agencies and departments, focus on IT security remains somewhat feeble, with few initiatives yet under way, and an expected growth in spending of less than 20 percent by 2010. But VARs inclined to set the market on the back burner for now might want to think twice, as government looks to industry for some initial education and hand-holding.

    Spending on IT security is expected to increase from $6.1 billion in 2005 to $7.3 billion in 2010, according to Input, a Reston, Va.-based research firm. Furthermore, spending on professional services associated with IT security -- the design, development and operation of security systems, as well as upgrades and maintenance -- is expected to grow from $3.7 billion in 2005 to $4.4 billion in 2010. While $1 billion increase in spending is nothing to sneeze at, it doesn't exactly present the goldmine right off the bat that some VARs might have expected.

  • USA: Military cybersecurity demands new mechanisms and training

    The Defense Department’s cyber security efforts require broader-based training and better support mechanisms for the military services, while still protecting civil liberties, said Lt. Gen. Keith Alexander, the man expected to head the military’s new Cyber Command.

    “The nation that started the Internet ought to be the first to secure it and still protect civil liberties,” he said, speaking at a cybersecurity conference in Washington Thursday. “We can and we must.”

  • USA: Minnesotas State Web sites' security in question

    Information officer says license tab site a fluke, other sites are safe

    You can buy hunting and fishing licenses. Fork over the registration fee for your boat or snowmobile. Renew a nursing or physician license. Report workplace injuries. Pay your taxes. You can do a lot of business with the state of Minnesota online.

    But how secure is the personal and financial information that people share with the state via the Web?

  • USA: New Bill Would Create Office of Cyber Policy to Protect Nation from Cyber Terrorism

    Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Federal Financial Management Subcommittee Chairman Tom Carper, D-De., on June 10th introduced comprehensive legislation to modernize, strengthen, and coordinate the security of federal civilian and select private sector critical infrastructure cyber networks.

    The Protecting Cyberspace as a National Asset Act of 2010, S.3480, would create an Office of Cyber Policy in the White House with a director accountable to the public who would lead all federal cyberspace efforts and devise national cyberspace strategy.

  • USA: New Defense wireless policy tightens security

    After more than two years of modifying and updating a 2004 wireless policy, the Defense Department has released a memorandum aimed at boosting security on wireless local area networks connected to the Global Information Grid.

    The supplemental policy, signed off on June 2 by Defense CIO John Grimes, requires the IEEE 802.11i standards to be used for wireless LANs and devices, and technologies that can store, process or transmit unclassified information. The old policy required that wireless devices use cryptographic modules validated to Federal Information Processing Standard 140-2.

  • USA: New ID solutions

    Identity and credentialing advances with PIV-1

    There is a change taking place around identity and credentialing in the enterprise and government markets. Identity is now an enterprise business requirement with its own infrastructure, policy and budget. Identity makes use of open standards to achieve interoperability and requires the highest level of assurance. The change is that physical access control and other enterprise applications no longer issue credentials. Instead, they use a common digital identity of digital certificates and the 21st century utility of the Internet as well as private networks.

  • USA: NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines

    The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats.

    The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set of guidelines is intended to facilitate organization-specific Smart Grid cyber security strategies focused on prevention, detection, response and recovery.

Zum Seitenanfang