People

Avocent to buy LANDesk for up to $476M

The purchase will allow federal IT managers to streamline the tools and processes they use to manage IT in large, distributed environments, a company official said.

Cybersecurity

Checklist outlines new cyberthreats

The Cybersecurity Checklist looks at potential vectors for real-world cyberattacks and recommends ways to thwart them.

People

DHS ramps up TWIC program

By the end of summer, DHS will check the backgrounds of 400,000 port workers, Chertoff said.

People

UPDATED: Beaming across the border

DHS and State disagree on which security technology to use for border protection

Modernization

In-Q-Tel head resigns

Just months after taking the position to lead CIA ventures, Yoran unexpectedly steps down, citing a desire to be home more.

People

Feds look to ants, wikis and blogs

The CIA already has more than 1,000 internal blogs and an internal wiki with about 10,000 pages.

People

Lee: FEMA working on biz relationships

She said the agency is emulating DOD's practices before the 2006 hurricane season starts.

People

InfoZen wins $148M TSA contract

Company will be responsible for overseeing systems in the Office of Transportation Threat Assessment and Credentialing.

People

DHS: E-passport live test a success

The agency is on track to meet its Oct. 26 deadline for use of the passports.

People

US-VISIT chief wants tougher border security

As the PASS card program is in development, Jim Williams wishes for more ways to spot criminal suspects and possible terrorists.

People

UPDATED: GAO: Feds must standardize info-sharing policies

The 26 agencies it reviewed have 56 different sensitive-but-classified designations.

Modernization

Military branches can now IM

The services are using Bantu's Inter-domain Messaging gateway to chat and conference.

Modernization

Accidental publicist

Agencies are risking the unwitting release of sensitive information using popular office software.

Modernization

Pentium computers vulnerable to cyberattack

Security experts warn of that and other risks at CanSecWest/core 06

Cybersecurity

Cyberattackers can exploit Pentium self-defense

The vulnerability affects every computer that runs on x86 architecture, an expert said at the CanSecWest/core06 conference.

Cybersecurity

Time for a new look at security

Intelligence community experts plan to streamline their security procedures.

Modernization

GAO: Common Criteria is not common enough

Auditors say the process takes too long and its effectiveness is not well-understood.

People

DOJ, DOD stress self-powered communications

The departments say Hurricane Katrina exposed the need for technology that can operate without a traditional infrastructure.

Cybersecurity

Security system checks take too long, experts say

Current certification and accreditation processes for federal information systems don’t reflect the modern network environment, a panel said today.

Cybersecurity

Video surveillance gets smart

Integrated systems are evolving from mere watchers to security enforcers.