The integration of government's Security Content Automation Protocols with TCG's Trusted Network Connect could add automated policy enforcement to scanning and evaluation of security status.
A task force created to bring security policies and practices for national security and non-national security systems into line with each other as produced an initial set of common standards, but much work remains before the full benefit of the process is realized, according to the GAO.
Connecting with the rest of the world could soon require the use of IPv6, and agencies should begin preparing now to use the new protocols.
A DriveSavers survey of 636 information technology security and support personnel asks for criteria in vetting a data recovery company that could wind up handling sensitive data.
The new guidelines for securing an intelligent power distribution network released build on a security framework released in January and are the product of a 450-member public-private working group headed by the National Institute of Standards and Technology.
Pressed for time and money, agencies are often lax about vetting third-party data recovery companies. New NIST guidance seeks to correct the problem.
NIST has updated guidelines for securing the Domain Name System, including the use of DNSSEC to cryptographically sign zone information to ensure the availability and integrity of DNS data.
Federal Computer Week spoke today with Ernest McDuffie, who is leading the National Institute of Standards and Technology's coordination of the National Initiative for Cybersecurity Education.
Commerce Secretary Gary Locke today said there was a 22 percent savings in this year's budget for the 2010 U.S. Census.
The Agriculture and Commerce departments are rushing to review and approve $4.2 billion in stimulus law funding for broadband by Sept. 30, a report says.
Apple's iPad tablet computer is attracting some interested glances from government
White House Cybersecurity Coordinator Howard Schmidt should take action to deal with problems posed by global cyberspace policy questions, a report says.