Digital services take center stage at Adobe assembly – FedScoop

Tuesday’s Adobe Digital Government Assembly in Washington, D.C. Produced by FedScoop, attracted nearly 1,000 federal and industry IT professionals to exchange ideas on the latest lessons leaned in a variety of areas, from digital content engagement to big data and cloud computing to security and e-learning.

 

 


Are Self-Driving Cars A Smart City Hacker’s Dream?Homeland Security Magazine

The future autonomous vehicle will be just another device the automotive Internet of Things, which opens up the future smart city to potential cybersecurity threats, warned Moshe Shlisel, CEO of Guardknox Cyber Technologies, a leading cybersecurity firm specializing in self-driving cars.

 


Momentum Picking Up to Improve Emergency Alert Tech, as Another False Alarm Is SoundedHomeland Security Magazine

Less than a month after Hawaii emergency officials sent an erroneous missile warning to the public and just hours before Congress was set to hold a hearing on how to prevent such incidents, the National Weather Service and private firm AccuWeather botched a tsunami warning test across the entire Eastern seaboard.

 


Biography of a WormPCWorld Magazine

Networks choke on traffic, and crash. Computers reboot continuously, paralyzing banks, airlines, and hospitals. The cause: an attack by a worm named Sasser, which dominated the Internet for five days last May, infecting millions of computers.

 


EXCLUSIVE: Despite revelations of NSA hacking, Huawei seeks to ‘normalize’ relations with USFedScoop

Just three months before it learned the National Security Agency had hacked into its networks, China’s largest telecommunications equipment maker met with senior U.S. government officials in an effort to demonstrate its commitment to security.

 


NYPD Teams Up With Microsoft On Counterterrorism Tech InitiativeAOL Government

New York City has entered into what it’s calling a strategic technology partnership with Microsoft Corp. to aggregate and analyze public safety data in real-time, and provide law enforcement officers with a comprehensive view of emerging terrorist threats and criminal activity.

 


Data Act Could Usher In Era Of Real Transparency In GovernmentAOL Government

A coalition of technology companies on Tuesday launched a major lobbying effort aimed at showing members of Congress that data transparency in federal spending is not only possible, but could be achieved in short order using standard markup languages and electronic identifiers that the commercial world has been leveraging for years.

 


Battle Lines Being Drawn Over Cybersecurity LegislationAOL Government

Just two days after introducing the controversial Cybersecurity Act of 2012, Senate lawmakers on Thursday plan to hold a hearing on the legislation, raising concerns that what some are calling a flawed piece of legislation may be on the fast-track for approval by the end of March.

 


50M Electronic Votes Could Be Insecure, Say ResearchersComputerworld

WASHINGTON — IT security researchers said they have uncovered significant vulnerabilities in the electronic voting systems that nearly 30% of all registered voters will use in this November’s presidential election.

 


Simulating FallujahComputerworld

The enemy can be anywhere — behind any door or any window, on any rooftop or around any corner. It’s the uncertainty and the 360-degree nature of the urban battle that not only makes it a dangerous and deadly endeavor, but also one of the most stressful of military operations.

That raises the question: How do you create a training environment that replicates the stress and uncertainty of such operations?

 


Studies: U.S. security threatened by InternetCNN

During the next 15 years, the U.S. will face a new breed of Internet-enabled terrorists, criminals and nation/state adversaries that will launch attacks not with planes and tanks, but with computer viruses and logic bombs, according to two reports released last month.

 


CIA grappling with its role amid IT revolutionCNN

Unless the CIA can find a way to tap into the IT revolution taking place in the private sector, it runs the risk of becoming an irrelevant player in the major national security policy debates of the future, according to an internal agency memo made public this week.