security

See the following -

All Scientific Papers to Be Free by 2020 Under EU Proposals

Nadia Khomami | The Guardian | May 28, 2016

All publicly funded scientific papers published in Europe could be made free to access by 2020, under a “life-changing” reform ordered by the European Union’s science chief, Carlos Moedas. The Competitiveness Council, a gathering of ministers of science, innovation, trade and industry, agreed on the target following a two-day meeting in Brussels last week...

Read More »

An open source cyberattack tracking tool released called Hone

William Jackson | Government Computer News | April 18, 2012

Researchers at an Energy Department lab have released an open-source tool called Hone to spot the source of malicious activity inside the enterprise more quickly. Glenn Fink, a computer scientist at the Pacific Northwest National Laboratory, invented Hone to help pinpoint compromises. Read More »

Analysis: Government’s Vast Lockers Of Data Threaten Basic Individual Freedoms

Major Garrett | Nextgov | June 12, 2013

I’m going to try to tie together strands of information NSA-style and see if a pattern emerges. I will be looking for signs that America’s historic definition and understanding of privacy are being eroded. I will also try to understand if that erosion could fundamentally alter an individual American’s relationship to government power. Read More »

ANALYSIS: Happy Data Privacy Day, Punk!

Kurt Mackie | RedmondMag.com | January 27, 2012

Data Privacy Day starts on January 28, but the parties behind it might not be its best advocates, nor even take the concept seriously. Read More »

Analysis: IT Experts Question Architecture Of Obamacare Website

Sharon Begley | Reuters | October 5, 2013

Days after the launch of the federal government's Obamacare website, millions of Americans looking for information on new health insurance plans were still locked out of the system even though its designers scrambled to add capacity. Read More »

Anatomy Of An Electronic Health Record Zero-Day

Kelly Jackson Higgins | Dark Reading | December 4, 2013

How a dangerous security flaw discovered in one of the most pervasive electronic medical record platforms in the U.S. was found and fixed before it could do damage Read More »

Anonymous Claim Apple's Touch ID Is Linked To US Surveillance

Johnny Evans | Computerworld | October 1, 2013

Anonymous have some big claims concerning Apple [AAPL] Touch ID system, claiming a connection between the technology and the US defense industry to claim it's just another step forward for state surveillance. Read More »

Anti-RSA TrustyCon Draws Packed House Seeking Modern Security Know-How

Serdar Yegulalp | InfoWorld | February 28, 2014

Disgusted by the possibility that RSA took $10 million in NSA money to use a deliberately flawed encryption algorithm, a small contingent of folks originally slated to appear at the 2014 RSA Conference decamped and staged their own security-themed get-together: TrustyCon. Read More »

Apple, Google, Facebook, Microsoft, Twitter And Others Call For More NSA Transparency

John Paczkowski | AllThingsD.com | July 17, 2013

Apple, Google, Facebook, Microsoft are part of a broad alliance of technology companies and civil liberties groups that will tomorrow demand dramatically increased transparency around U.S. government surveillance efforts. Read More »

Apple’s Fingerprint ID May Mean You Can’t ‘Take The Fifth’

Marcia Hofmann | Wired | September 12, 2013

[...] While there’s a great deal of discussion around the pros and cons of fingerprint authentication — from the hackability of the technique to the reliability of readers — no one’s focusing on the legal effects of moving from PINs to fingerprints. Read More »

Are Apple iOS, OS X Flaws Really Backdoors For Spies?

Ellen Messmer | Network World | February 26, 2014

Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More »

Are Federal IT Initiatives Strangling Agency Networks?

Tom Sullivan | Government Health IT | September 10, 2013

Dubbing the collective of federal IT efforts currently under way the “Big Five” in a report published Monday, MeriTalk found that the majority of agencies intend to deploy them within the next two years. Read More »

B3 Group Awarded DVA T4 Task Order for 24 x 7 Core Infrastructure Service (CIS) Support

Press Release | B3 Group, Inc. | October 23, 2015

B3 Group, Inc. will be partnering with ProSphere-Tek to provide to the VA with 24×7 Core Infrastructure Service (CIS) Support on this five (5) year contract. The mission of the Department of Veterans Affairs (VA), Office of Information & Technology (OI&T), Service Delivery and Engineering (SDE) Enterprise Systems Engineering (ESE), System Design and Core Systems Engineering Services (SDCS), Enterprise Messaging and Collaboration Services (EMCS)

Read More »

Back Off, NSA: Blackphone Promises To Be The First Privacy-Focused Smartphone

Sharif Sakr | Engadget | January 15, 2014

You may never have heard of Geeksphone, unless you take a particular interest in Firefox OS, but the Spanish manufacturer could be about to garner some global attention. It says it'll launch a new handset at Mobile World Congress next month that will prioritize privacy and security instead of all the intrusions that smartphone users usually have to put up with [...]. Read More »

Battle Heats Up Over HealthCare.gov Paper Trail

Joseph Marks | Nextgov | December 13, 2013

A battle over the paper trail documenting the troubled building of the Obama administration’s online health insurance marketplace heated up on Friday as contractors declined to withhold some documents from congressional overseers and the lead investigating committee’s ranking Democrat accused his Republican counterpart of unfair dealing. Read More »