Veterans Affairs may have been biased when it awarded last year a high-bid, $133 million IT security services contract to the incumbent provider, the consultancy Booz Allen Hamilton, a VA inspector general audit contends.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
Sen. Joseph Lieberman is no Don Quixote, but as a leader on Capitol Hill on all matters cybersecurity, the Connecticut Independent Democrat has a lot invested in getting his dream of enactment of comprehensive cybersecurity legislation before he retires from Congress next year.
None of the agencies surveyed by GAO could precisely enumerate the number of IT security personnel they employed. In fact, estimates within agencies varied widely, based on who was reporting and analyzing employment data.
Congress reacts to an April inspector general report, which revealed that 36 percent of interviewed FBI field agents assigned to cyber investigations admit they lacked the expertise to investigate cyberintrusions.
Because of increasingly constrained resources, DOT's Office of Chief Information Officer is unlikely to fix within a year some of the security shortfalls detailed in the inspector general's report, CIO Nitin Pradhan says.
Want more money to spend on your enterprise's information security programs? Deloitte's Mike Brown and Amry Junaideen say IT security managers must show their non-IT bosses how the lack of IT security would adversely affect their operations.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
The Department of Energy's inspector general identifies flaws in the areas of access controls, vulnerability management, web application integrity, contingency planning, change control management and cybersecurity training.
Ineffective or noncompliant security practices of service providers, the inability of customers to examine controls, the prospect of data leakage and the loss of data if a cloud service is terminated present challenges.
Security incidents reported over the past five years have placed the confidentiality, integrity and availability of sensitive government information and information systems at risk, an annual GAO review reveals.
Government Accountability Office auditors say a lack of prioritization has kept agencies from requiring the use of personal identification verification credentials to obtain access to federal computer systems.