Think of chief information security officers as silent types, diligent professionals who get the job done with little fanfare.
Nearly two dozen federal agency CISOs got a bit more expressive, of sorts, as they voiced their views about their jobs and federal government IT security as participants in a survey...
It's a scene out of the movies: a team of hackers attacking key federal IT systems, creating havoc, with defenders countering to keep the computers up and running.
Congratulations to Ron Ross, senior computer scientist and information security researcher at the National Institute of Standards and Technology, for being named to the Information Systems Security Association's Hall of Fame for his leadership in the development of influential information security documents. This...
Much ado has been made that tech-savvy President Obama appointed the federal government's first chief technology officer, Virginia Technology Secretary Aneesh Chopra.
But don't tell that to Norman Lorentz, a strategic adviser at the nonpartisan and not-for-profit Partnership for Public Service. Lorentz can lay...
The White House website, along with the majority of other top .gov sites analyzed, received failing grades from the Online Trust Alliance for not preventing deceptive e-mail and phishing scams, according to the group's analysis of e-mail authentication adoption practices.
The number of jobless IT professionals in the United States rose by half this past year, but the number employed remained relatively stable, according to an analysis of Bureau of Labor Statistics data.
What's the rush?
Legislation to create the post of White House cybersecurity advisor who would report directly to the president, introduced earlier this week by Sens. Jay Rockefeller, D.-W.Va., and Olympia Snowe, R.-Maine, may prove to be a great idea. Yet, was the legislation introduced too soon?
With the launch of GovInfoSecurity.com comes the launch of my blog, The Public Eye.
First, a brief biography. I've been a journalist for too long. In my first job I used a manual typewriter and had a pair of sharp scissors and a paste pot on my desk.
As federal agencies ponder whether to use cloud computing--the ability to access applications and data on servers over the Internet--the big security challenge isn't necessarily technical, employing the right technologies to assure the protection of data. What could prove to be an obstacle is certifying host IT...
The time is ripe to create a fourth branch of the military a cyber-warfare branch.
So conclude two Army officers. The existing cultures of the Army, Navy and Air Force are fundamentally incompatible to adequately defend against cyber attacks, argue Lt. Col. Gregory Conti and Col. John "Buck" Surdu, in an article...
A figure bandied about a lot in recent months is $1 trillion. That's how much the Congressional Budget Office projects the nation's deficit could grow each year if much of President Obama's budget plan is enacted by Congress.
A big predicament the government faces is the high cost to fix IT security problems on federal government legacy systems that steals money away from the research needed to build new, secure systems.
Every day I'm driving to or from work -- or even on the weekends - it seems like I hear about some new urgent priority that I must be aware of, whether it be the flailing economy, President Obama's directives, data breaches, or any number of other news-worthy items. But I love the news - so I don't mind!
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.