Experts tell Congress that technology to provide for perfect attribution won't be possible anytime soon. Yet if it were, the solution could raise privacy and civil liberties concerns that many Americans would find untenable.
Economics and a lack of standards and interoperability have stood as barriers to widespread adoption of two- and multifactor authentication, DHS's Bruce McConnell said.
An audit has determined that 10 to 20 percent of the Department of Veterans Affairs' vendor contracts lack information security clauses, VA CIO Roger Baker says.
People who customize software often don't know what they're doing, creating an environment where adversaries can exploit unintended vulnerabilities, says Robert Lentz, the longtime Defense chief information security officer.
This case study examines a U.S. Air Force initiative to implement application security and software assurance practices following the massive breach of an Air Force information system.
The Air Force began realizing that it had been losing unknown quantities of data and information. Like the rest of the federal...
Secure records can be re-linked to reproduce the transactional history by an independent agency, a necessary component for a forensic framework for web services, a new National Institute of Standards and Technology report states.
The idea that the Lieberman-Collins-Carper bill provides for the White House to set cybersecurity strategy and Homeland Security oversee operations is a gone one, Lewis says, though the lines of responsibility aren't as clear as they need to be, but that can be fixed.
The sophistication of security breaches of federal information systems and reports of improper access to these systems continues to grow at an alarming rate. Clearly, there is concern about and a desire to improve the security of these critical infrastructures. So where and how do we begin to effectively safeguard...
With all forms of theft on the rise, government agencies and businesses must take every precaution to secure their workforce and assets. That's why many agencies are utilizing retransfer technology to produce high-security ID cards. Retransfer technology uses a heating process to "print" an image on a security...
Buried deep within the 854 pages of the Senate version of the National Defense Authorization Act are the basic elements of cybersecurity reform, including provisions to update parts of FISMA, the primary law governing IT security.
Focusing on security features at both the infrastructure and application level isn't enough. Organizations must also consider flaws in their design and implementation. Hackers looking for security flaws within applications often find them, thereby accessing hardware, operating systems and data. These applications are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.