The latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks.
By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.
2009 was a year a promises. Will 2010 see those promises fulfilled? What you'll read in this GovInfoSecurity.com special report is our take on major cybersecurity challenges the federal government is facing in 2010.
You'll also get to sample our diverse coverage from the past year.
Here's the lineup of this...
Cloud computing gives the jitters to those charged with protecting their organization's IT assets. To gauge the concerns of security professionals about cloud computing, we're fielding a global survey covering all industries. We want to know your views.
If we're at war, the fight so far is unbalanced, and the U.S. should be grateful its cyberspace adversary is Iran. "We're probably not very prepared for a virtual conflict against a really competent state, such as Russia or China," says Rand Corp.'s Martin Libicki.
October's top news and views: White House slow to executive cybersecurity policy, why NSA should be trusted and infosec evolution will mimic immune system. And don't miss our month-in-review podcast by Executive Editor Eric Chabrow