Protecting United States borders has always been a top priority. However, what is stated as a goal of halting illegal immigration has evolved to a focus on keeping potential terrorist threats out of the US.
Financial institutions must address a growing number of regulations designed to ensure the security, integrity and confidentiality of customer and corporate data . Regulations are often mandatory and compliance must be verifiable. In many cases, organizations and their company officers found to be non-compliant may be...
It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
Citizens have a heightened expectation of privacy when they interact with the government online, says Heather West, a CDT policy analyst with the advocacy group Center for Democracy and Technology.
As the federal government begins to pilot the use of third-party credentials to authenticate users at three websites, the advocacy group Center for Democracy and Technology this month has published a white paper, Issues for Responsible User-Centric Identity, raising questions it feels must be addressed before...
This application will let Navy personnel post ideas in the form of a blog and invite participation from other users no matter their position within the organization or their geographical location, Carey said.
The landscape of hackers is filled with stories from those whose job is to hunt them down. SANS forensics instructor, Rob Lee, also a senior forensics consultant at the IT security consultancy Mandiant shares three "villain" examples of the types of attacks being seen in the field by the company's forensic...
The National Institute of Standards and Technology released Wednesday a new draft of the document Secure Domain Name System Deployment Guide, or Special Publication 800-81.
NIST says this revision addresses feedback received for the first revision through public comments in March, in addition to adding three new...
Identity theft is a growing concern for governments, businesses and citizens alike. "We're in the middle of a national identity crisis," says Neville Pattinson, VP of Government Affairs & Standards, NA., Gemalto. In an exclusive interview, Pattinson discusses:
The case for credentialing;
Practical applications of...
Identity theft is a growing concern for governments, businesses and citizens alike. "We're in the middle of a national identity crisis," says Neville Pattinson, VP of Government Affairs & Standards, NA., Gemalto. In an exclusive interview, Pattinson discusses:
The case for credentialing;
Practical applications of...
Do you truly know who's accessing your critical information systems?
The Heartland data breach and Countrywide insider crime remind us: These systems are vulnerable to malicious attacks from outside and within the institution.
And recent consolidations and mergers within the industry also underscore the...
It's a marriage made in heaven, if your the tropical island of Oahu as paradise.
In 2005, newly elected Honolulu Mayor Mufi Hannemann assembled the city's public safety and IT officials together to develop an integrated security program, forming a public safety oversight committee, chaired by chief information...
The NISP Operating Manual (NISPOM) prescribes the requirements, restrictions, and other safeguards necessary to prevent unauthorized disclosure of classified information by US Government Executive Branch departments and agencies. NISPOM Chapter 8 addresses information-system security procedures and...
In the fall of 2006, Los Alamos Laboratory was faced with performing an audit of the organization's cyber security systems, including inspections of its safeguards and security functions.
This case study outlines how Los Alamos Labs' complex heterogeneous IT environment needed a solution that provided centralized...
So, did anyone read about the President's Cybersecurity Action Plan? I'm assuming you've read through all 10 points. You didn't stop to ponder after the first few did you? I mean, you didn't happen to stop after number 8? The one about the incident response plan?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.