The Epsilon e-mail breach has opened the door for what experts fear could be 'massive spear phishing attacks.' Here are 7 security tips to help organizations protect themselves and their customers.
"We really need to speak the language of business and focus less on the language of IT, and that involves risk management" Iowa CISO Jeff Franklin says. "You really need to target those resources to your most critical systems."
The bill, sponsored by House Cybersecurity Caucus Co-Chair James Langevin, would create a White House office of cyberspace and replace paper-based FISMA compliance with automated, continuous monitoring of IT systems.
Computer scientists at the National Institute of Standards and Technology have released five draft documents on various aspects of information security, and NIST is seeking comments on those drafts.
From the White House to the State House, here are the 10 most important happenings in government IT security in 2010. Not everything promised at the beginning of the year came about as some had hoped. So, what else is new in government?
"Organization-wide monitoring cannot be efficiently achieved through manual processes alone or through automated processes alone; however, automation can make the process of continuous monitoring more efficient," NIST says.
Many threats to the confidentiality, integrity and availability of critical data on federal government networks can be traced to a lack of compliance. Read this white paper and find out how IBM's expertise can help you build a robust IT security solution governance program that detects, protects and manages...
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
Federal CIO Vivek Kundra has high hopes for CyberScope, which agencies are to use next month to report on their FISMA compliance. But 85 percent of agency CIOs and CISOs say they have yet to use the tool, a new survey reports.
The tediousness of complying with the rules to secure federal government information systems are laid out in the latest inspector general's audit of the Department of Homeland Security.
A FISMA compliance approach that relies on a manual and labor-intensive process can produce mountains of paper and electronic documents that no one can organize and make sense of. Such a compliance strategy results in overwhelming confusion where the assumption is that everything is in place because personnel are too...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.