Congratulations to Ron Ross, senior computer scientist and information security researcher at the National Institute of Standards and Technology, for being named to the Information Systems Security Association's Hall of Fame for his leadership in the development of influential information security documents. This...
Observations from day one of the RSA Conference.
Edgar Allan Poe might be the conference theme, but the topic everybody is talking about? Government.
From financial regulatory reform and compliance to the Obama Administration on cybersecurity, attendees and sponsors alike all are talking about the convergence of...
For those who say the National Security Agency wants to take charge of the nation's cybersecurity, the agency's director has a message: You're wrong, says Lt. Gen. Keith Alexander in his RSA Conference keynote address.
New guidance on enterprise password management from the National Institute of Standards and Technology is aimed at helping federal government agencies mitigate common threats against character-based passwords.
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
Much ado has been made that tech-savvy President Obama appointed the federal government's first chief technology officer, Virginia Technology Secretary Aneesh Chopra.
But don't tell that to Norman Lorentz, a strategic adviser at the nonpartisan and not-for-profit Partnership for Public Service. Lorentz can lay...
And so it begins ...
As this morning dawns on San Francisco, so begins the 2009 edition of the RSA Conference.
As anyone in information security can tell you, this is the Mardi Gras, the Super Bowl, the event in the industry. It's where security professionals from all walks of the public and private sectors come...
President Obama's naming of federal chief performance and technology officers establishes a team that includes the CIO to develop and execute federal IT management and security policies.
A misnomer among some is that the federal Chief Information Officer Council is headed by the federal CIO.
According to the E-Government Act of 2002, the CIO technically the administrator of e-government and information technology serves as director of the CIO Council. But the top slot, chairman, goes to the deputy...
White House advisor Melissa Hathaway was to submit as early as Friday to President Obama her 60-day study on federal cybersecurity policy and processes, which should serve as the basis for the administration's forthcoming cybersecurity policy.
Not knowing what she'll report, I suspect that most, but not...
The White House website, along with the majority of other top .gov sites analyzed, received failing grades from the Online Trust Alliance for not preventing deceptive e-mail and phishing scams, according to the group's analysis of e-mail authentication adoption practices.
To this point, information security professionals have been generalists. Going forward, they'll have to be specialists. At least this is the opinion of John Rossi, professor of systems management/information assurance.
In an exclusive interview on the future of the information security profession, Rossi...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.