2:15 am, May 26, 2015

Search Result

Search Tags:  security

Link between usability and security

If the lock to your house required special training to work, you'd be more likely to take your chances and leave the place unlocked. That's how it is with cyber security. If security procedures and systems are too complicated, users tend to skip them. But research at the National Institute of Standards and Technology is establishing a link between usability and security and will make the results available this summer to federal agencies.

Tags: technology , cyber ,

Thursday - 05/07/2009, 09:30pm EDT

Missing- terabyte of personally identifiable information.

Uh oh. It's happened again. A hard drive containing a terabyte of personally identifiable information has gone missing. It disappeared from a lab desk inside the National Archives in College Park, Maryland. The disk housed social security numbers of Clinton White House visitors and of the Gore family. Once again proving that the insider threat is as potent as any attack launched from overseas. I'm Tom Temin.

Tags: management , cyber , Clinton , Gore , SSN

Thursday - 05/21/2009, 02:03pm EDT

Members of Congress will get security suggestions

A House Democratic leader says he thinks lawmakers will be taking precautions when meeting with the public in the wake of a congresswoman's shooting in Arizona.

Tags: Gabrielle Giffords , Roscoe Bartlett , Ben Cardin , Eleanor Holmes Norton , Arizon shooting , Congress , U.S. Capitol Police , Tom Davis

Sunday - 01/09/2011, 10:30am EST

Analysis: DHS changes aviation security standards

Homeland Security Today editor David Silverberg has more.

Tags: management , aviation security , national security , homeland security , Homeland Security Today , David Silverberg

Monday - 04/05/2010, 05:41pm EDT

Reinventing Security at the Pentagon

The Pentagon is in the process of a "complete reinvention" of security.

Tags: technology , Pentagon Force Protection Agency , Steven Calvery

Friday - 04/02/2010, 08:25pm EDT

Advances Research Project Agency on security and privacy concerns

Since Christmas Day attack attempt, office has been forced to deal quickly with issues.

Tags: management , technology , privacy , DHS , Advanced Research Projects Agency , Dr. Roger McGinnis

Monday - 01/11/2010, 06:23pm EST

Border Agent corruption: causes and cures

Mexican drug cartels are infiltrating federal law enforcement agencies along the southwest border and those charged with weeding them out say they don't have the money to catch all the corrupt agents, homeland security officials told a U.S. Senate panel Thursday.

Tags: DHS , CBP , mngt , Thad Bingel , Command Consulting , federal hiring , best practices , background checks

Friday - 03/12/2010, 11:08am EST

The cloud in a steel shell

The U.S. Air Force has awarded IBM a contract to design and demonstrate a secure cloud computing infrastructure capable of supporting defense and intelligence networks.

Tags: tech , contracting , cybersecurity , IBM , USAF , Air Force , cloud computing , Robert Ames , IBM Federal

Monday - 02/08/2010, 10:40am EST
  • 3