Topic:

Security and Privacy

Latest Headlines

Latest Headlines

DISA makes classified mobile access program fully operational, plans to triple number of users

The Defense Mobile Classified Capability–Secret has moved out of the pilot phase with the latest release that provides improved call interoperability, failover or redundancy, and a new mobile device management system.

Next-gen PIV cards provide federal employees with secure mobile access

New technical specifications from the National Institute of Standards and Technology enable smart identity card holders to access government computer networks from mobile devices.

Federal agencies need to develop clear guidance, perform cost analysis for BYOD programs

The Advanced Technology Academic Research Center and Mitre Corp. recently released a report that summarized collaborative sessions, including one on a bring-your-own-device program, during the Federal Mobile Computing Summit in February.

Audit: Little progress on interoperable radio communications among DHS agencies

In a November 2012 report, the DHS inspector general found that less than 0.25 percent of the 479 radio users tested could access and use the common channel. Additionally, only 78 of 382 radios tested, or about 20 percent, had all the correct program settings for the common channel.

Digital privacy and mobile device surveillance bills advance in California

Two California Senate bills – one mandating that law enforcement get a warrant before accessing electronic communications and another requiring public comment before cell phone intercept technology can be adopted locally – have advanced in the last week and a half.

Mobile permission requests shouldn't be mysterious, says FTC official

An expert at the Federal Trade Commission has some ideas for how to make access requests and information flows more secure using incentives and opportunities based on the principle of least privilege.

Apple, Google and massive alliance tell Obama not to weaken encryption, introduce 'backdoors'

The companies were among more than 140 civil society groups, corporations, trade associations and security and policy experts urging President Obama to promote rather than undercut data encryption technology. 

'Least privilege' is key to securing mobile devices, says FTC official

The principle of least privilege, which holds that "every program and every user of the system should operate using the least set of privileges necessary to complete the job," is key to ensuring and maintaining security in a mobile world, says an FTC official.

Federal court says no warrant needed to get cellphone location data

A much larger 11-member panel revisited the case, saying that Davis doesn't own the cellphone records because they were created by a third party telephone company for legitimate business purposes.

NIST issues identity management considerations for FirstNet

As work moves forward on a nationwide public safety broadband network, the National Institute of Standards and Technology released guidelines for addressing identity management across the new system.