Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    GAO Outlines Gaps in Security

    Written by

    Caron Carlson
    Published March 23, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A little over a year after the Federal Information Security Management Act went into effect, government agencies continue to be dogged by network vulnerabilities and slow reform. To point agencies in the right direction, the U.S. General Accounting Office last week enumerated 18 technologies in five categories to better protect networks.

      With the GAOs advice as a backdrop, the Federal Office Systems Expo will open here this week with the spotlight on information security—and vendors are leaping to the call for help.

      DigitalPersona Inc., in partnership with Microsoft Corp. and GTSI Corp., plans to roll out a new version of its enterprise password automation technology based on fingerprint identification. According to the Redwood City, Calif., company, Pro 3.0 will change password management by making it fully automated.

      In its report last week, the GAO identified fingerprint recognition as a potentially helpful authentication technology for agencies but cautioned that it doesnt work for about 2 to 5 percent of people. In addition, the GAO said, fingerprint recognition scanners can be prone to error and some can be “tricked” into taking latent prints that were reactivated.

      GAO security categories

      • Access control: To restrict unauthorized users
      • System integrity: To ensure that data is not corrupted
      • Cryptography: To ensure data is accessible only to authorized users
      • Audit and monitoring: To perform investigations during and after attacks
      • Configuration management: To change security settings

      Valt.X Technologies Inc. will unveil Cyber Secure hard disk drives, which the Ontario company heralds as the greatest advance in securing hard drive data since the invention of the hard drive. The “Valt.X Security Computer on a chip” locks in place a known clean image of data, which prevents unauthorized changes by allowing users to revert to the clean data upon restarting a computer. With the new system, data on the hard drive is encrypted in real time, and the technology automatically deflects viruses, spyware and other hacker attacks.

      While noting the importance of cryptography to agencies network security, the GAO warned that encryption technology, to be effective, must be an integral component of enforced security practices.

      In the conferencing arena, even conferences over instant messaging technology can be secure, according to Scientific Devices Inc., which plans to announce a system that allows workers at remote offices to join calls for a cost-effective meeting. Audit trail functions come included in the new system from the Ridgefield Park, N.J., company.

      In the wireless realm, Senforce Technologies Inc., a maker of location-based enterprise security software in Orem, Utah, is teaming with Panasonic Computer Solutions Co. and GTSI to offer a new way for organizations to deploy wireless technologies in robust notebook computers. The joint initiative is responding to a secure computing directive from the Pentagon, but it applies to enterprise mobile workers as well.

      Caron Carlson
      Caron Carlson

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×