April 2010

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other m...

  • intelligence community

    The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security.

  • Fortezza

    Fortezza, Italian for "fortress," is a family of security products trademarked by the US government's National Security Agency.

  • Defense Message System (DMS)

    The Defense Message System (DMS) is a secure X.400-based e-mail system developed by the United States government in conjunction with industry partners to ensure safety for critical operations.

  • lifestyle polygraph

    A lifestyle polygraph is a lie-detector (polygraph) test that is administered as a requirement for employment in certain fields.

  • HSPD-7 (Homeland Security Presidential Directive No. 7)

    HSPD-7 (Homeland Security Presidential Directive No. 7) was a directive issued by U.S. President George W. Bush in December, 2003 that updated policies intended to protect the country from terroris...

  • CALEA (Communications Assistance for Law Enforcement Act)

    CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information...

  • National Security Agency (NSA)

    The National Security Agency (NSA) is the official U.S. cryptologic (the science of cryptographic design and decryption) organization.

  • national identity card

    A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their ide...

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure ...

  • Tempest

    Tempest was the name of a classified (secret) U.S. government project to study (probably for the purpose of both exploiting and guarding against) the susceptibility of some computer and telecommuni...

  • security clearance

    A security clearance is an authorization that allows access to information that would otherwise be forbidden.

  • government Trojan

    A government Trojan is spyware installed on a computer or network by a law enforcement agency for the purpose of capturing information relevant to a criminal investigation. Government Trojans repre...

  • The banking malware scourge

    Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.

  • Database activity monitoring keeps watch over your data

    Database activity monitoring can help with security and compliance by tracking everything going on in the database.

  • OWASP Top 10 vulnerabilities list adds risk to equation

    OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.

  • Microsoft Windows 7 security features

    Microsoft Windows 7 security aims to improve security without the headaches of Vista.

  • The real information security risk equation

    A simplified information security risk equation helps translate information security risk to users.

  • Four steps toward a plan for a career in information security

    Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.

  • Cybersecurity bill lacks details

    The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.