Publication: Government Info Security

First reported Jul 22 2014 - Updated Jul 22 2014 - 1 reports

Modernizing the VA's EHR System

How VistA Exchange Could Improve Secure Data FlowEnabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, ... [Published Government Info Security - Jul 22 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

Downed Airliner: Trigger for Cyber War?

Minimal Cyber-Attacks Seen as Ukraine, Gaza Conflicts IntensifyThe downing of a Malaysian airliner by an anti-aircraft missile and air and land battles in Israel and Gaza raise concerns about whether these conflicts will expand to include cyber-attacks, ... [Published Government Info Security - Jul 18 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

UK Surveillance Bill Advances

A controversial U.K. data-retention bill has been passed by the House of Commons after just one day of debate. The House of Lords could vote on the measure by week's end.The Data Retention and Investigatory Powers Bill, introduced July 10 by the British ... [Published Government Info Security - Jul 16 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

Career Tips for CSOs in Law Enforcement

FBI Security Expert Describes the Needed SkillsThe word 'security' takes on a whole new level of importance when you take a job in federal law enforcement, says Joshua Belk, CSO of the FBI's San Francisco division.Working as a CSO in law enforcement is ... [Published Government Info Security - Jul 16 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

ATM Cash-Out Strikes Red Cross Accounts

Why Prepaid Cards Are Prime Targets for FraudFederal authorities have announced the successful prosecution of yet another member of an international cybercrime ring that's been tied to a global ATM cash-out scheme. This time, the scheme was linked to ... [Published Government Info Security - Jul 16 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Data Breach Linked to Tax Fraud Ring

Alabama Dept. of Public Health Notifying 1,200 Young AdultsThe Alabama Department of Public Health is contacting about 1,200 individuals born in 1995 and 1996 who have had their information compromised and could be potential victims of a $20 million ... [Published Government Info Security - Jul 08 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Why Global Internet Governance is Tough

Michael Daniel Maps Out Path to Secure Cyberspace CooperativelyWhite House Cybersecurity Coordinator Michael DanielIs having too many stakeholders who care about cyberspace's viability a hindrance to cybersecurity?That's one way to interpret comments ... [Published Government Info Security - Jul 08 2014]
First reported Jul 01 2014 - Updated Jul 01 2014 - 1 reports

Fraud Summit - Orlando

Date: November 18, 2014Limited Seats Available - Register TodayFrom account takeover to payment card fraud and the emerging mobile threatscape, the ISMG Fraud Summit series is where thought-leaders meet to exchange insights on today's top schemes and ... [Published Government Info Security - Jul 01 2014]
First reported Jun 26 2014 - Updated Jun 27 2014 - 1 reports

Industry News: Verizon Unveils Smart Credential

Also: Latest from Corero, BeyondTrust and BTVerizon is offering Smart Credential, a new service to help businesses manage risk by using a single credential in both the physical and virtual worlds. The solution is a cloud-based service delivered as so ... [Published Government Info Security - Jun 26 2014]
First reported Jun 26 2014 - Updated Jun 27 2014 - 1 reports

EU Agencies Target Cybercrime

ENISA and Europol to Collaborate on Crime-Fighting EffortsTo better prevent and investigate online crime that affects Europe, the European Network and Information Security Agency, or ENISA, and the Europol police force - including its European Cybercrime ... [Published Government Info Security - Jun 26 2014]
First reported Jun 26 2014 - Updated Jun 26 2014 - 1 reports

FISMA Reform Heads to Senate Floor

Committee Also Approves Two Other Cybersecurity BillsThe Senate moved a significant step closer to updating the 12-year-old law that governs federal information security when the Homeland Security and Governmental Affairs Committee on June 25 approved ... [Published Government Info Security - Jun 26 2014]
First reported Jun 21 2014 - Updated Jun 21 2014 - 1 reports

Redeeming NIST's Reputation

Bill Would Ban NSA from Undermining NIST Crypto StandardsRep. Alan Grayson's amendment would bar NSA meddling on NIST standards.If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, ... [Published Government Info Security - Jun 21 2014]

Quotes

The project will entail ASM taking VistA's "historical, legacy structure ... and making it more modular and open so information can flow" Traficant says
...of homeland security consultancy Red Branch Consulting and former deputy assistant secretary for policy at the Department of Homeland Security. "Despite all of the fears about nation-state critical infrastructure attacks ... what you see is the equivalent of a cyber cold war."
...legislation is urgently required" to replace the now-invalid regulation, it's not clear why the government called for the bill to be fast-tracked. "The contrast between the time taken by the government to consider their response and the time given to Parliament to scrutinize the bill is a matter of concern, not least because of suspicions that are naturally aroused when legislation is fast-tracked" it says
"In our job, it's really about catching the bad guy and helping the victims," Belk says. "If you can understand that as an information security professional, then I think you're going to be successful."

More Content

All (20) | News (20) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Modernizing the VA's EHR System [Published Government Info Security - Jul 22 2014]
Downed Airliner: Trigger for Cyber War? [Published Government Info Security - Jul 18 2014]
UK Surveillance Bill Advances [Published Government Info Security - Jul 16 2014]
Career Tips for CSOs in Law Enforcement [Published Government Info Security - Jul 16 2014]
ATM Cash-Out Strikes Red Cross Accounts [Published Government Info Security - Jul 16 2014]
Data Breach Linked to Tax Fraud Ring [Published Government Info Security - Jul 08 2014]
Why Global Internet Governance is Tough [Published Government Info Security - Jul 08 2014]
Fraud Summit - Orlando [Published Government Info Security - Jul 01 2014]
Industry News: Verizon Unveils Smart Credential [Published Government Info Security - Jun 26 2014]
EU Agencies Target Cybercrime [Published Government Info Security - Jun 26 2014]
FISMA Reform Heads to Senate Floor [Published Government Info Security - Jun 26 2014]
Redeeming NIST's Reputation [Published Government Info Security - Jun 21 2014]
Senate Panels to Tackle Cyber Bills [Published Government Info Security - Jun 20 2014]
Privacy Groups Decry UK Surveillance [Published Government Info Security - Jun 17 2014]
Internet Explorer Bug: Steps to Take [Published Government Info Security - Apr 29 2014]
Cybersecurity Drill: Lessons Learned [Published Government Info Security - Apr 21 2014]
Heartbleed Causes Breach in Canada [Published Government Info Security - Apr 14 2014]
New Arrests in $45 Million ATM Cash-Out [Published Government Info Security - Nov 21 2013]
Banks Skeptical About DDoS Ceasefire [Published Government Info Security - Jan 30 2013]
4 Banks Respond to DDoS Threats [Published Government Info Security - Dec 12 2012]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.