Government - Page 77

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Government News

Financial industry fears feds' security rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal regulators are developing information security rules for the financial services industry to protect customer data. But executives at affected banks, brokerages, and insurance companies say mandating stringent security requirements, such as encrypting stored or transferred data, will increase their costs . . .

Security: Who should be in charge?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Should the Defense Department assume responsibility for safeguarding the countrys communications infrastructure? A retired Navy vice admiral now working in the private sector said the time has come for public debate on the question. . . .

Carnivore review team rudely unmasked

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When the US Department of Justice (DoJ) released the winning Carnivore review proposal in Adobe .pdf format, they apparently failed to mask the names and other details of the review team adequately. According to Cryptome, the details can be unmasked by . . .

Europeans Defining The Long Arm Of The Cyberlaw

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

European and U.S. officials are moving toward a final draft of the world's first international treaty on cybercrime, a broad effort that high-tech industry groups and privacy advocates fear could intrude on personal privacy and hamper e-commerce. . . .

Ex-NSA expert warns of concealed backdoors

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Former NSA (National Security Agency) analyst and representative of Internet rights watchdog EPIC (Electronic Privacy Information Centre) Wayne Madison warned privacy groups Friday that a growing number of proprietary commercial software applications may have backdoors allowing the . . .

Nations struggling to fight cybercrime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

European and U.S. officials are moving toward a final draft of the world's first international treaty on cybercrime, a broad effort that high-tech industry groups and privacy advocates fear could intrude on personal privacy and hamper e-commerce.. . .

Survey reveals CIOs' top security concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Federal chief information officers are concerned that hackers will gain control of federal computers and damage Web sites or hurt the systems of other agencies, according to a new survey. The survey, conducted by the System Administration, Networking, and Security (SANS) . . .

A bug in the legal code?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Nearly four weeks after Judge Lewis Kaplan ruled in favor of the movie industry, ordering a hacker Web site not to post or link to DeCSS, copies of the DVD-decrytping code abound. There are offshore DeCSS posters and anonymous types running . . .

E-Signature Act may drive demand for authentication technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Oct. 1, the Electronic Signatures in Global and National Commerce Act, or E-Sign, will take effect, giving electronic signatures the same legal standing as their paper-and-pen counterparts. This expansive federal legislation considers facsimiles of an original signature and recorded agreements . . .

Close Enough for Government Work? A Brief History of Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux is up against some stern arguments against its use in secure government computing--arguments open source security experts are happily blowing apart. The open source development method itself came under fire in a recent article in Government Computer News titled "Linux . . .

Federal report: Government computers pose security risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The government's computer systems remain "fraught with weaknesses," posing security risks at a host of federal offices, including the Defense and Treasury departments, a report released Monday found. The report, prepared for Congress by the General Accounting Office, said that . . .

Senate debates FBI’s trustworthiness

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Can the public trust the government to limit its use of the system to capturing spies, hackers and terrorists while protecting the privacy of law-abiding Americans? Or should that trust be given to another party that would administer the online taps? . . .

SEC targets alleged Web pyramid scheme

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For a $1,495 membership fee plus $149 a month, Le Club Prive offered investors a chance to earn commissions by recruiting new members to the club, the Securities and Exchange Commission said in its civil suit filed in federal court in . . .

Horn to grade agencies' security practices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The lawmaker who, with his periodic report cards, shamed federal agencies into taking steps to rid their most critical computer systems of the Year 2000 computer bug plans to shed the same light on the government's computer security practices. Rep. Stephen . . .

Is Government's Future Electronic?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Web has forever changed the way governments at all levels interact with one another and with the citizens they serve. Widespread Internet access is expected to completely alter people's ability to tap into government resources in the next few years . . .

Jersey taking hard look at computer crime

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two New Jersey agencies are calling for the state to strengthen its computer crime laws, enhance law enforcement training, and beef up education programs to combat computer-related crime. Concerned about the proliferation of child sexual abuse, fraud, identity theft, hacking, cyberstalking, . . .