The final installment of our five-part series on this year's top five federal cybersecurity challenges tackles the growing role the National Institute of Standards and Technology performs in securing government IT.
The fourth installment of our five-part series on this year's top five federal cybersecurity challenges looks at the information security implications of cloud computing, which is being championed by Federal CIO Vivek Kundra.
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
The call to aid the devastated country of Haiti came just hours after a 7.0 earthquake hit the impoverished Caribbean island on Tuesday.
Just as quickly as the tweets came in asking for donations, so too came the cyber criminals looking to divert funds from legitimate charities to their own pockets.