Under the program, the State Department scans every computer and server not less than every 36 hours on eight security factors, resulting in an overall risk reduction of 90 percent on key unclassified networks.
"When you have project like this, it's not just about firewalls; it's about analytics, it's about correlations, it's about bringing the whole picture together," IBM Institute for Advanced Security's Charles Palmer says.
"The strategy with TIC was to define a manageable number of access points... and then just begin reducing and consolidating the external connections to run through those access points," Fed Network Security Director Matt Coose says.
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses: