Publication: Government Info Security

First reported Jul 28 2014 - Updated 18 hours ago - 1 reports

NY Proposes Bitcoin Regulations

Framework Includes Anti-Money-Laundering ProvisionsThe banking industry is watching closely as the New York State Department of Financial Services proposes a groundbreaking "BitLicense" regulatory framework for virtual currency businesses that's designed ... [Published Government Info Security - Jul 28 2014]
First reported Jul 25 2014 - Updated Jul 25 2014 - 1 reports

IG: HHS Must Improve Access Controls

Audit Uncovers 5 High-Risk VulnerabilitiesThe Department of Health and Human Services inspector general has criticized HHS for failing to implement security controls on the system that provides computerized access to physical facilities and computer ... [Published Government Info Security - Jul 25 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

IRS Employee Charged in ID Theft Scheme

Crime Ring Made $1.2 Million in Fraudulent Credit Card PurchasesA former U.S. Internal Revenue Service employee and two others were arrested and charged in an alleged identity theft scheme that involved stealing personally identifying information on individuals, ... [Published Government Info Security - Jul 24 2014]
First reported Jul 24 2014 - Updated Jul 24 2014 - 1 reports

Shaping a Cloud Services Contract

Give and Take in Defining Security Terms of an AgreementDelaware Chief Security Officer Elayne StarkeyAs a customer, Delaware Chief Security Officer Elayne Starkey has seen the evolution of cloud computing over the past three years to a point where she ... [Published Government Info Security - Jul 24 2014]
First reported Jul 22 2014 - Updated Jul 22 2014 - 1 reports

Modernizing the VA's EHR System

How VistA Exchange Could Improve Secure Data FlowEnabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, ... [Published Government Info Security - Jul 22 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

Downed Airliner: Trigger for Cyber War?

Minimal Cyber-Attacks Seen as Ukraine, Gaza Conflicts IntensifyThe downing of a Malaysian airliner by an anti-aircraft missile and air and land battles in Israel and Gaza raise concerns about whether these conflicts will expand to include cyber-attacks, ... [Published Government Info Security - Jul 18 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

UK Surveillance Bill Advances

A controversial U.K. data-retention bill has been passed by the House of Commons after just one day of debate. The House of Lords could vote on the measure by week's end.The Data Retention and Investigatory Powers Bill, introduced July 10 by the British ... [Published Government Info Security - Jul 16 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

Career Tips for CSOs in Law Enforcement

FBI Security Expert Describes the Needed SkillsThe word 'security' takes on a whole new level of importance when you take a job in federal law enforcement, says Joshua Belk, CSO of the FBI's San Francisco division.Working as a CSO in law enforcement is ... [Published Government Info Security - Jul 16 2014]
First reported Jul 16 2014 - Updated Jul 16 2014 - 1 reports

ATM Cash-Out Strikes Red Cross Accounts

Why Prepaid Cards Are Prime Targets for FraudFederal authorities have announced the successful prosecution of yet another member of an international cybercrime ring that's been tied to a global ATM cash-out scheme. This time, the scheme was linked to ... [Published Government Info Security - Jul 16 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Data Breach Linked to Tax Fraud Ring

Alabama Dept. of Public Health Notifying 1,200 Young AdultsThe Alabama Department of Public Health is contacting about 1,200 individuals born in 1995 and 1996 who have had their information compromised and could be potential victims of a $20 million ... [Published Government Info Security - Jul 08 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Why Global Internet Governance is Tough

Michael Daniel Maps Out Path to Secure Cyberspace CooperativelyWhite House Cybersecurity Coordinator Michael DanielIs having too many stakeholders who care about cyberspace's viability a hindrance to cybersecurity?That's one way to interpret comments ... [Published Government Info Security - Jul 08 2014]
First reported Jul 01 2014 - Updated Jul 01 2014 - 1 reports

Fraud Summit - Orlando

Date: November 18, 2014Limited Seats Available - Register TodayFrom account takeover to payment card fraud and the emerging mobile threatscape, the ISMG Fraud Summit series is where thought-leaders meet to exchange insights on today's top schemes and ... [Published Government Info Security - Jul 01 2014]

Quotes

...consumers and root out illegal activity - without stifling beneficial innovation," says Benjamin Lawsky, superintendent of financial services. "Setting up common sense rules of the road is vital to the long-term future of the virtual currency industry, as well as the safety and soundness of customer assets."
"Security controls over the implementation of the HSPD-12 at HHS were inadequate because essential information security requirements were not implemented" Thomas Salmon, HHS assistant inspector general, writes in a summary of an audit on the department's personal identity verification cards program
...and creates chaos in the victims' lives," says Rod Ammari, Treasury inspector general for tax administration at the San Francisco field division. "When an IRS employee is involved in stealing information through their employment at the IRS and facilitating identity theft rings, it will not be tolerated."
...the right extra staff and the right resources to have a full-blown audit program is the ideal way to enforce the terms and conditions," she says. "But the economic situation has not allowed for that, yet."

More Content

All (23) | News (23) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
NY Proposes Bitcoin Regulations [Published Government Info Security - Jul 28 2014]
IG: HHS Must Improve Access Controls [Published Government Info Security - Jul 25 2014]
IRS Employee Charged in ID Theft Scheme [Published Government Info Security - Jul 24 2014]
Shaping a Cloud Services Contract [Published Government Info Security - Jul 24 2014]
Modernizing the VA's EHR System [Published Government Info Security - Jul 22 2014]
Downed Airliner: Trigger for Cyber War? [Published Government Info Security - Jul 18 2014]
UK Surveillance Bill Advances [Published Government Info Security - Jul 16 2014]
Career Tips for CSOs in Law Enforcement [Published Government Info Security - Jul 16 2014]
ATM Cash-Out Strikes Red Cross Accounts [Published Government Info Security - Jul 16 2014]
Data Breach Linked to Tax Fraud Ring [Published Government Info Security - Jul 08 2014]
Why Global Internet Governance is Tough [Published Government Info Security - Jul 08 2014]
Fraud Summit - Orlando [Published Government Info Security - Jul 01 2014]
Industry News: Verizon Unveils Smart Credential [Published Government Info Security - Jun 26 2014]
EU Agencies Target Cybercrime [Published Government Info Security - Jun 26 2014]
FISMA Reform Heads to Senate Floor [Published Government Info Security - Jun 26 2014]
Redeeming NIST's Reputation [Published Government Info Security - Jun 21 2014]
Senate Panels to Tackle Cyber Bills [Published Government Info Security - Jun 20 2014]
Internet Explorer Bug: Steps to Take [Published Government Info Security - Apr 29 2014]
Cybersecurity Drill: Lessons Learned [Published Government Info Security - Apr 21 2014]
Heartbleed Causes Breach in Canada [Published Government Info Security - Apr 14 2014]
New Arrests in $45 Million ATM Cash-Out [Published Government Info Security - Nov 21 2013]
Banks Skeptical About DDoS Ceasefire [Published Government Info Security - Jan 30 2013]
4 Banks Respond to DDoS Threats [Published Government Info Security - Dec 12 2012]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.