A big complaint about the Federal Information Security Management Act (FISMA) is that agencies complying with its provisions merely prove they're following processes aimed at securing information systems, but they don't necessarily prove the systems are indeed secure.
In an exclusive interview, Ron Ross, the...
Is 2009 the Year of the Insider Threat?
Last August's arrest of a Countrywide employee in California illustrates the potential impact of a single insider with access to sensitive information. The FBI charged the former employee with taking 2 million names and personal information from the mortgage bank and selling...
Rod Beckstrom cited the lack of appropriate funding and the growing cybersecurity role of the National Security Agency, the super-spy agency administered by the Defense Department, as reasons behind his resignation as director of the Department of Homeland Security's National Cybersecurity Center (NCSC) effective...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Vivek Kundra, tapped Thursday as the nation's first federal chief information officer, will have a second day job, that of administrator of e-government and IT in the White House Office of Management and Budget.
Despite the recession and record job losses, information security remains a top concern for public and private sector organizations. But what can security professionals do to protect their careers and be considered for these jobs?
In an exclusive interview, Pat Myers, chair of (ISC)2, discusses:
Top security and...
The Obama administration is looking to develop metrics that would require agencies to continuously monitor the security of their information systems, moving beyond the quarterly and annual reporting required by the Federal Information Security Management Act.
President Obama created the post of federal Chief Information Officer on Thursday, and named Vivek Kundra, Chief Technology Officer of Washington, D.C., to job.
Over the years, security and compliance experts at ReymannGroup have performed numerous compliance reviews and risk assessments. Through these engagements and other forums, we have engaged hundreds of executives in discussions about the need for a comprehensive and strategic approach to data security and compliance....
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Heartland Payment Systems (HPY) may be the only "new" data breach, after all.
A week after at least two banking institutions and a state banking association reported a new data breach that had been announced to them by Visa, the credit card company now is saying that its recent alerts to card issuers were actually...
With nearly 95,000 federal workers that's almost 8 percent of the government workforce telecommuting at least part time, information security managers face the constant challenge of assuring that data and systems remain safe from those accessing them remotely.
Tom Davis wrote the original Federal Information Security Management Act in 2002, and says the legislation has served the government and nation well. The one-time powerful chairman of the House Government Reform Committee, which provides oversight on information technology matters, feels it's time for Congress to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.