Tom Davis wrote the original Federal Information Security Management Act in 2002, and says the legislation has served the government and nation well. The one-time powerful chairman of the House Government Reform Committee, which provides oversight on information technology matters, feels it's time for Congress to...
A figure bandied about a lot in recent months is $1 trillion. That's how much the Congressional Budget Office projects the nation's deficit could grow each year if much of President Obama's budget plan is enacted by Congress.
U.S. Sen. Bill Nelson says computers in his office have been hacked at least three times one of them the Florida Democrat characterized as "serious" over the past two months, and he believes the breach came from China.
A Senate bill to establish an office of cybersecurity in the White House is in the works.
The legislation, sponsored by Sens. Jay Rockefeller of West Virginia and Olympia Snowe of Maine, would establish a permanent cybersecurity official who would report directly to the President.
Some $2.5 billion of the $787 billion stimulus package signed by President Obama in February will be spent on federal government IT, including information security, according to an analysis by the market intelligence firm IDC.
A big predicament the government faces is the high cost to fix IT security problems on federal government legacy systems that steals money away from the research needed to build new, secure systems.
Malware infecting Internal Revenue Service computers increased by 45 percent last year to 961 incidents, according to a Treasury Department inspector general's report.
Though IRS automatically scans workstations weekly for malware, only 89 percent of the agency's servers are scanned each week. The others were either...
An audit of the Security and Exchange Commission IT systems reveals 23 new weaknesses in controls intended to restrict access to data and systems, as well as weaknesses in other information security controls.
Two companies that provide the federal government with information security services have become one. ManTech International has closed the deal to acquire DDK Technology Group, a contractor servicing the Defense Department's Naval Criminal Investigative Service. ManTech did not disclose the purchase price.
In the wake of the Heartland Payment Systems (HPY) data breach, credit card company Visa is on the road talking to its network of payment processors about current security threats and the merits of the Payment Card Industry Data Security Standard (PCI DSS).
A single undercover investigator used fraudulent documents to obtain four valid passports from the State Department last year, the Government Accountability Office revealed Monday.
Heartland Payment Systems (HPY) has been removed from Visa's list of compliant service providers, and banking institutions affected by the Heartland data breach have until May 19 to file their fraud claims with Visa.
This news emerged late last week from a public statement by Visa, as well as from a letter sent by...
Vivek Kundra's action that might cost him his job as the federal chief information officer isn't that he necessarily did anything illegal indeed, no such allegations have been made but his association with a subordinate who was arrested last week on bribery charges.
We all know the risk of the insider threat is high, but what are the specific vulnerabilities for which organizations should be particularly vigilant?
In an exclusive interview, Randy Trzeciak of Carnegie Mellon's CERT program discusses recent insider threat research, including:
Patterns and trends of insider...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...