Federal government cybersecurity specialists working in the trenches seem more concerned than IT executives about their agencies ability to withstand a cyber attack, a new survey says.
A group of experts assembled by the National Institute of Standards and Technology and National Security Agency has reached a consensus on the definition of the term privilege management, which describes a set of processes for managing the data, attributes and policies in particular that determine a user's access...
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's new about federated ID management;
Challenged to...
Security researchers have uncovered a complex ecosystem of cyber espionage made up of an unknown number of hackers that have systematically broken into computer networks worldwide.
Under the program, the State Department scans every computer and server not less than every 36 hours on eight security factors, resulting in an overall risk reduction of 90 percent on key unclassified networks.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
"We very much hope that the Chinese government respects our decision, though we are well aware that it could at any time block access to our services," says Google Chief Legal Officer David Drummond.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.