As the government adds new applications to its information systems, the more openings it creates for attackers to gain access, creating a continuing battle between IT security professionals charged with safeguarding the systems and those seeking to cause them damage.
"The more functionality that's there, the more...
The National Institute of Standards and Technology characterizes its new guidance released this past week as transformational, and no one can speak more authoritative about it than Ron Ross, NIST's highly regarded senior computer scientist, information security researcher and FISMA implementation project leader who...
The fact that new technologies and trends present new threats to government information systems isn't new, but research from the privacy and IT security think tank Ponemon Institute links particular technologies or trends to specific vulnerabilities.
The National Institute of Standards and Technology new draft of revised guidance promotes the notion of what it terms 'near real-time risk management' for federal IT systems.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Many of our notions of warfare are based on destroying the other side and that simply doesn't apply in the cyberwar, Martin Libicki, senior management scientist at the think tank RAND Corp., says in an interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.