The Federal Government has just concluded its public consultation phaseregarding input for updating legislation for the copyright act.ITsecurity does not immediately spring to mind...
Voice over IP - VoIP - is inevitable in government. It is the hottest area, and many government departments are exploring how they can take advantage of its benefits - like greater flexibility in service and features and possibly lower costs. This rating is reserved for the most critical problems.
The software vulnerability life cycle starts with a newly discovered or published vulnerability and ends when machines are patched. In practice, however, all machines will never be patched, so vulnerabilities are tracked as a half-life, when for example half of vulnerable hosts are patched. According to Qualys, the current half-life for Internet-facing hosts is 19 days, down from 30 days a couple of years ago. However, we lose this race to the hackers as the average latency now is only six days from discovery to attacks. It is important to note that 80 per cent of attacks occur during the first half-life. So if you are a target - and government departments are - you had better be patched or shield for a known vulnerability right away.