security
See the following -
Ubuntu 13.04 Review: Linux For The Average Joe Or Jane
Hard core Linux fans won't care for it, but for the average user the new Ubuntu desktop Linux has a lot to offer. Read More »
- Login to post comments
UK Cabinet Office Relaunches Data.gov.uk, Releases Open Data White Paper
The British government is doubling down on the notion that open data can be a catalyst for increased government transparency, civic utility and economic prosperity. Read More »
- Login to post comments
UK Government defines Open Standard's Principles
In a huge win for open standards, open source and the public, the long-awaited UK government definition of open standards has come down firmly on the side of RF, not FRAND. The UK government's approach is enshrined in an important new document defining what it calls Open Standards Principles. Read More »
- Login to post comments
UK's Security Branch Says Ubuntu Most Secure End-User OS
CESG, the UK government's arm that assesses operating systems and software security, has published its findings for ‘End User Device’ operating systems. The most secure of the lot? Ubuntu 12.04. Read More »
- Login to post comments
US Government Opens Access to Federal Source Code with Code.gov
In March of this year, the Obama administration created a draft for Federal Source Code policy to support improved access to custom software code. After soliciting comments from public, the administration announced the Federal Source Code policy in August. One of the core features of the policy was the adoption of an open source development model: This policy also establishes a pilot program that requires agencies, when commissioning new custom software, to release at least 20 percent of new custom-developed code as Open Source Software (OSS) for three years, and collect additional data concerning new custom software to inform metrics to gauge the performance of this pilot...
- Login to post comments
Ushahidi Wins MacArthur Award: Changing The World One Map At A Time
Recognizing remarkable creativity and effectiveness by non-profits across the globe, the John D. and Catherine T. MacArthur Foundation named 13 organizations as recipients of the MacArthur Award for Creative and Effective Institutions. Read More »
- Login to post comments
VA Awards Contract For Mobile Device Management, Apps Store
The Department of Veterans Affairs has awarded a long-awaited contract to build a system that will manage a stable of mobile devices officials hope will eventually grow to 100,000 handhelds and tablets. Read More »
- Login to post comments
VA BYOD Reimbursement Strategy Isn't IT's Call, Says Baker
Who pays for data plans under a forthcoming bring-your-own-device strategy at the Veterans Affairs Department? Don't ask Chief Information Officer Roger Baker--determining that isn't his job, he says. Read More »
- Login to post comments
VA Data Exchange Practices Lack Security
Veterans Affairs Department medical centers are not effectively or securely sharing data with research and university facilities, according to an Oct. 23 VA office of inspector general report (.pdf). Read More »
- Login to post comments
VA Harnesses Big Data For Broader Impact
Dr. Stephan Fihn is sitting on the edge of a revolution at the Department of Veterans Affairs, where big data is becoming easily accessible for clinicians and analysts throughout its 160 hospitals. Read More »
- Login to post comments
VA Networks Besieged By Foreign Attackers, IG Says
Foreign attackers have repeatedly penetrated Veterans Affairs Department networks for at least the past three years, potentially gaining access to millions of unencrypted veterans records and other sensitive databases, according to House lawmakers and VA inspector general auditors. Read More »
- Login to post comments
VA, DoD EHR Project: Security Game Plan
Although the Department of Veterans Affairs and Department of Defense are taking a new approach to building their long-awaited integrated electronic health record system, many key components of the data security strategy for the project will remain the same, says Roger Baker, the VA's outgoing CIO. Read More »
- Login to post comments
Vampire Data And 3 Other Cyber Security Threats For 2013
Kroll Advisory Solutions has released its 2013 Cyber Security Forecast, spotlighting some of the pressing and perhaps unexpected privacy and security issues healthcare and other organizations may be grappling with in the coming year. Read More »
- Login to post comments
VanRoekel: Agencies To Adopt NSTIC
The Office of Management and Budget wants agencies to adopt the National Strategy for Trusted Identities in Cyberspace, or NSTIC, to enable shared, citizen identity management across government. Read More »
- Login to post comments
VA’s Roger Baker Updates EHR Security Strategy
Outgoing Assistant Secretary for Information and Technology and U.S. Department of Veterans Affairs (VA) CIO Roger W. Baker provided testimony last week on the VA and Department of Defense (DoD) joint EHR venture. In doing so, he highlighted how the organizations plan on maximizing data security with the new technologies. Read More »
- Login to post comments