Three of the largest agencies are using improved governance processes to reduce the number of duplicative technology systems. The Defense Department has developed a three pronged approach to examine new IT projects. Teri Takai, the DoD chief information officer, said the investment review board, the acquisition process and the Defense Business Systems Management Committee have [...]
JOINT BASE SAN ANTONIO-RANDOLPH, Texas (AFNS) – Software developers have created a new mobile Web application that allows total force Airmen the ability to account for themselves and family members from their smartphone during a crisis or natural disaster. During a crisis, the Air Force uses the Air Force Personnel Accountability and Assessment System to account for [...]
WINSTON-SALEM, N.C., Feb. 16, 2012 /PRNewswire via COMTEX/ — Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities. Now [...]
A “distributed denial of service” attack – or what security gurus call a DDoS attack – is a little like what happens to Groundhog.org on Groundhog Day. For 364 days out of the year, nobody cares about groundhog fun facts. And then on Groundhog Day-BOOM! Third-graders, Bill Murray fans and TV weather newscasters flock to [...]
If you can’t access the Internet come March 8th, the FBI may be to blame. On that date, a number of domain name servers are due to be taken offline, rendering all computers that use them net-less. Before you go get upset about this, or even worried, there’s a pretty legitimate justification here; the action [...]
The National Institute of Standards and Technology (NIST) released its recommendations for a new, privately led steering group to tackle the complex policy and technical issues necessary to create an online environment where individuals and organizations will be able to better trust one another. In a report released Feb. 7, 2012, NIST also announced its [...]
A House panel Wednesday approved legislation that would require the mostly privately operated national critical infrastructure to adopt information security standards to safeguard their IT systems and networks.