The Transportation Security Administration has several programs for sharing security information, but the availability and quality of information needs improvement, according to a Nov. 21 Government Accountability Office report (.pdf). The Homeland Security Information Sharing Network Critical Sec...
Posts Tagged: PDF
The Federal Energy Regulatory Commission has not fully implemented cybersecurity policies and procedures due to budget and resource constraints, FERC officials told auditors performing a fiscal 2011 cybersecurity audit (.pdf). The commission estimated it spent approximately $3.8 million to secure ...
If your power went out and everything stayed down, could you envision chaos and rioting? We’ve heard chaos and cyber mayhem tossed about frequently in the last couple weeks, so it may come as no surprise that Pike Research reported [PDF], “Utility cybersecurity is in a state of near cha...
The National Geospatial-Intelligence Agency (NGA) hired 600 to 700 new employees each year between 2005 and 2008, newly released budget documents indicate. Still, “the coming wave of retirement… presents significant risks that the program will lose valuable institutional knowledge and critic...
Credentials used to access Veterans Affairs Department facilities and information systems were improperly issued due to missing procedures and significant control lapses in enrollment center operations, according to a VA Inspector General report (.pdf) published Sept. 30. The department may have i...
The Navy Department issued a 332-page draft request for proposal (.pdf) Sept. 30 for its massive Navy/Marine Corps Next Generation Enterprise Network. NGEN will replace the Continuity-Of-Service Contract, which is considered the federal government’s largest information technology program,...
A new Department of Homeland Security (DHS) and National Institute for Standards and Technology (NIST) effort to establish voluntary best practices for how ISPs should notify their customers whose machines are part of a botnet has met with some resistance from the service provider community. The Mes...
An influx of wireless technologies at federal buildings, bases and hospitals has chief information officers considering wireless local area networks, but WLANs present a unique set of cybersecurity risks that agencies must consider prior to implementation. According to draft recommendations from the...