Security Current Events

Security Current Events, Security News Articles.
Sort By: Most Viewed | Most Recent
Page 1 of 25 | 1000 Results
Helping managers get a handle on IT security
Two new publications issued by NIST will help senior executives, auditors, and others in federal agencies better understand how to manage, support and evaluate their information security programs. (2007-03-02)

The development of climate security discourse in Japan
This research traced discourses related to climate security in Japan to determine why so little exists in Japan and whether or not such discourse could suggest new areas for consideration to more comprehensively respond to the climate change problem. Based on categorization of various approaches by climate security-related literature outside Japan, the study revealed areas where Japan has been able to respond to, and other areas where almost no discussion is being made in Japan. (2020-10-01)

XML-based language formats checklists for IT security
To make it easier to measure the security of an information technology product or system, researchers at the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) have developed a common specification language--Extensible Configuration Checklist Description Format (XCCDF)--for writing security checklists and related documents. (2005-01-26)

Space and security policy in Europe
A study on (2003-12-11)

Homeland security initiative takes Memphis' ORNL technologies to the nation
The Department of Homeland Security's recent selection of Memphis as a (2004-08-23)

Updated federal guide on cryptography available
In an increasingly open environment of interconnected computer systems and networks, security is essential to ensure that information remains confidential, is not modified or destroyed and is available when needed. To help federal agencies protect sensitive, but unclassified information, the National Institute of Standards and Technology has updated a set of guidelines for selecting and implementing cryptographic methods. (2006-01-17)

Federal standard issued for improving IT security
Computer security specialists at the National Institute of Standards and Technology (NIST) have developed a new standard to help federal agencies better protect their computer networks. The standard provides a new way to categorize government information and information systems. (2004-02-13)

Book explores how to break software security
Just a year after publishing the best-selling How to Break Software: A Practical Guide to Testing, Florida Tech Professor Dr. James A. Whittaker has published How to Break Software Security: Effective Techniques for Security. The book is co-authored by Herbert H. Thompson, who earned a doctoral degree from Florida Tech. (2004-01-22)

Comments sought on draft federal IT security standard
To help federal agencies improve their information technology security and comply with the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) recently released for public comment the draft of Federal Information Processing Standard (FIPS) Publication 200, Minimum Security Requirements for Federal Information and Information Systems. (2005-07-27)

Ukraine to receive mobile radiation detection vehicle
Nuclear and radioactive material from hospitals, power plants or industrial facilities can be abandoned, lost or even stolen. (2010-04-22)

Study determines why organizations fight data breaches differently
In the wake of recent high-profile security breaches at retail stores such as Target and Neiman Marcus, a new study from the University of Texas at Dallas determines why differences exist in the level of information security control resources among organizations. (2015-07-09)

Security guard industry lacks standards, training
Despite playing a more important role in the wake of 9/11, the security guard industry remains plagued by inadequate training and standards in many states, indicates new research by Michigan State University criminologists. (2014-06-03)

Conference to highlight biometric technologies
To showcase recent advances in the field of biometrics and examine technological and security issues facing the industry, the Biometrics Consortium Conference 2003 will be held Sept. 22-24, 2003, in Arlington, Va. The conference is sponsored by the National Institute of Standards and Technology (NIST), along with seven other federal, state and non-profit agencies that form the consortium. (2003-07-28)

September conference focuses on biometrics
The Biometrics Consortium Conference 2004, scheduled for Sept. 20-22, 2004, at the Hyatt Regency Crystal City in Arlington, Va., will showcase recent advances in technologies and address issues facing the biometrics industry and end users in a variety of areas, including homeland security, law enforcement, identity theft and interoperability. (2004-08-13)

Guidance on wireless local area network security is close at hand
NIST has released in final form a guide to enhanced security for wireless local area networks. (2012-03-07)

When strangers can control our lights
Smart home products such as lamps controlled via mobile devices are becoming ever more popular in private households. We would, however, feel vulnerable in our own four walls if strangers suddenly started switching the lights in our homes on and off. Researchers at the IT Security Infrastructures group, Friedrich-Alexander Universität Erlangen-Nürnberg have discovered security problems of this nature in smart lights manufactured by GE, IKEA, Philips and Osram. (2017-09-04)

Siemens and VTT begin cooperation to improve the information security of industry
Siemens and VTT have entered into a cooperation agreement aimed at improving the information security of Finnish industry. As a result, the agreement will allow Siemens to offer its industrial services as part of VTT's information security analysis. (2011-10-21)

IT program hopes to foster better security checklists
The National Institute of Standards and Technology, with sponsorship from the Department of Homeland Security (DHS), has developed a program to facilitate the development and sharing of security configuration checklists. The program helps developers make checklists that conform to common operational environments; provides guidelines for making better documented and more usable checklists; provides a managed process for reviewing, updating, and maintaining checklists; and includes an easy-to-use repository of checklists. (2005-08-30)

Carnegie Mellon hosts Cyber Corps
Carnegie Mellon received more than $4 million in grants through the National Science Foundation's Federal Cyber Service program to award scholarships to studnets who study information security. The unviersity is hosting a big symposium June 14-17 discussing job potentials in information security. (2003-06-12)

Computer guide may boost security testing efficiency
NIST has published for comment a draft of a new version a guide for assessing the effectiveness of security of controls in federal information systems. (2007-06-08)

Wake-up call: Draft security pub looks at cell phones, PDAs
On July 7, NIST published for comment draft guidelines on security considerations for cell phones and PDAs. Part of a series of publications on computer security issues, the draft guidelines provide an overview of cell phones and PDA devices in use today and the growing security threats that they face and propose a framework that organizations can use to manage the security risks. (2008-07-10)

Draft federal guidelines issued for computer security
NIST computer scientists released on Nov. 3 an initial public draft of Recommended Security Controls for Federal Information Systems (NIST SP 800-53). The publication, which details controls that will become mandatory for most federal systems in 2005, is expected to have a wide audience beyond the federal government. (2003-11-06)

Foresight food security: From hunger and poverty to food system approach
Long considered in relation to malnutrition and humanitarian aid, food security policy should be moving towards a much broader landscape and focusing on regular access to food for a population nearing nine billion towards 2030-2050, while addressing food insecurity for a fraction of communities, according to a JRC foresight report. (2015-08-18)

Conference on safeguarding health information, May 18-19
The Health Insurance Portability and Accountability Act was enacted by Congress to promote the use of electronic health records while protecting the confidentiality, integrity and availability of the information. To assist the understanding and expansion of these standards and practices, NIST is co-hosting the (2009-03-25)

Security guards struggle with PTSD and lack mental health support
New research shows that thousands of security guards in the UK are suffering Post Traumatic Stress Disorder (PTSD), having been exposed to frequent episodes of verbal and physical abuse. (2020-04-08)

Despite food-assistance programs, many children experience food insecurity, hunger
In a recent study, researchers found that food insecurity and hunger among children still persist, even in food secure households and despite food assistance programs and efforts to increase food security. Therefore, children who experience food insecurity may live in households that are defined as food secure. Previous research that indicates food insecure children are more at-risk for being overweight, having poor health, poor academic performance and poor psychosocial functioning. (2010-05-27)

2 EPA-led sessions at National Council on Science and Environment's 2012 conference
On Jan. 18, 2012, Dr. Peter Jutro of the Office of Research and Development at the US Environmental Protection Agency, will lead a session titled (2012-01-13)

October IT security automation conference to highlight health care IT, cloud computing
The Fifth Annual IT Security Automation Conference, co-hosted by NIST, will focus on emerging technologies designed to support the security automation needs of multiple sectors. The conference will be held Oct. 26-29 at the Baltimore Convention Center. (2009-09-22)

Security gets framed
Despite millions of dollars spent by IT companies, digital security still contains more holes than a Swiss cheese. One European project plans to plug those holes by creating a virtual security framework independent of both devices and the networks they are trying to access. (2005-11-28)

Grant success for Monash economists
Economist and lead researcher Dr. Paulo Santos from Monash University's Centre for Development Economics has received a $1.5 million grant from the Australian Centre for International Agricultural Research for his project on improving food security in the northern uplands of Laos. (2014-11-03)

Study links social security improvements to longer life span
A new study by researchers at New York Medical College suggests that when Social Security benefits are improved, people over the age of 65 benefit most, and may even live longer. The authors urge that, as Congress and the President discuss changes to Social Security, they consider the benefit of reduced mortality and improved health among older Americans. (2011-02-17)

Security preparedness at federally managed dams
A new report from the National Research Council, ASSESSMENT OF THE BUREAU OF RECLAMATION'S SECURITY PROGRAM, looks at the level of security preparedness at many of the nation's largest dams, including five national critical infrastructure sites: Hoover, Folsom, Grand Coulee, Glen Canyon, and Shasta dams. (2008-08-15)

New NIST pub can help IT managers assess security controls
A new publication released by NIST on June 30 can help information system managers negotiate the often complex process of assessing security controls in their information systems. (2008-07-10)

Security Blankets Can Substitute For Mom During A Child's Routine Medical Exam
New study finds that anxious children do better during routine medical exams if they are accompanied by either their mother OR their security blanket, but not both. (1997-08-17)

Research universities play a major role in national security
The United States' preoccupation with national security, including counterterrorism, counterintelligence and cyber security, is also a concern of higher education, according to Graham Spanier, president of Penn State University. (2011-02-18)

RIT to develop cybersecurity courses using warfare strategies and tactics
A gift from Intel will allow Rochester Institute of Technology faculty to transform computing security education by developing new cybersecurity curriculum on strategic thinking and tactics. (2016-02-12)

Airport security measures not backed by solid evidence
There is no solid evidence that the huge amounts of money spent on airport security screening measures since Sept. 11 are effective, argue researchers in this week's Christmas issue of the BMJ. (2007-12-20)

Controlling the language of security
Korean computer scientists have developed a security policy specification for home networks that could make us more secure from cyber attack in our homes. They report details in the International Journal of Ad Hoc and Ubiquitous Computing. (2009-09-18)

Security protocol for online banking and Facebook has 'serious weaknesses,' say researchers
The protocol that provides security for online banking, credit card data and Facebook has major weaknesses, according to researchers at Royal Holloway University. (2013-02-03)

Computer scientists develop tool to make the Internet of Things safer
Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security -- a first for the field. One of the tool's potential uses is described in the May-June issue of IEEE Micro magazine. (2014-06-02)

Page 1 of 25 | 1000 Results
   First   Previous   Next      Last is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to