It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.
Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
Since 1992, the U.S. has relied on supercomputers to simulate underground nuclear weapons tests, but congressional auditors contend there's limited assurance vital information can be recovered to meet national security priorities if the systems fail.
No one knows risk better than the internal auditor, and so no individual has a better opportunity to add risk management value to organizations, says Richard Chambers, president of the Institute of Internal Auditors.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
GAO says the Federal Deposit Insurance Corp. failed to implement sufficiently access and other controls intended to protect the confidentiality, integrity and availability of its financial systems and information.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.