This white paper details solutions designed for government agencies that provide the visibility, control and automation needed to support asset management across the IT asset life cycle, planning, acquisition, management and disposition of software, hardware and related licenses.
The result is lower asset costs,...
Citigroup confirms that a breach of its online banking platform, Citi Account Online, may have exposed personally identifiable information about hundreds of thousands of Citi customers.
Lacking technology is not the problem, says attorney Lucy Thomson. It's that today's technology is not being adequately used to fight modern cybersecurity threats.
Sony Corp.'s announcement that hackers may have accessed data on 77 million gamers follows a long line of recent breaches. And Neal O'Farrell of the Identity Theft Council says the string of incidents has led to consumer 'breach fatigue.'
Many technology leaders understand the need for data center renovation and development - but going from understanding to implementation raises a lot of "how to" questions; how to address power and cooling issues, how to enable organization and IT growth, how to build an energy-efficient data center, etc. As the...
Data centers are part of an ever changing world with challenges of high energy consumption, labor costs, data silos and growth in data volume. Learn how to meet these challenges with IBM's cohesive strategy for the development of a dynamic infrastructure, while also laying the foundation for a highly responsive...
"What we are trying to do in Michigan is to set the framework, which means that these cloud solution providers meet our requirements, not the other way around," says Ken Theis, director of the state Department of Technology, Management and Budget.
Removable media will be limited to mission-essential operations and only after strict compliance requirements are met, says Vice Admiral Carl Mauney, deputy commander of the United States Strategic Command.
Enterprise Risk Management (ERM) is a topic of interest throughout an organization - and increasingly at the board of director level.
But how does a security leader engage the board on ERM - and keep it engaged?
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
A $1.5 billion data center to support intelligence and defense agencies' cybersecurity initiatives will be built at a National Guard camp 26 miles south of Salt Lake City, a senior intelligence official says.
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
The Defense Department is taking steps to lift a 10-month-old ban on the use of most removable storage devices on Pentagon and military networks, but with a catch: only government-owned and procured USB flash media will be allowed.
The Defense Department is taking steps to lift a 10-month-old ban on the use of most removable storage devices on Pentagon and military networks, but with a catch: only government-owned and procured USB flash media will be allowed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.