"Consumer notification is often hampered by the fact that companies must first determine their obligations under 47 different state regimes," says Rep. Mary Bono Mack, R-Calif., the subcommittee's chair and bill's sponsor.
If enacted,the bill that's heading to the House floor would require increased coordination and prioritization of federal cybersecurity R&D activities and the development of cybersecurity technical standards. It also would strengthen cybersecurity education and talent development and promote industry partnership...
NIST's Ron Ross points out that its seminal security control guidance, Special Publication 800-53, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.
The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
The Department of Veterans Affairs is offering a $50,000 prize to a developer who successfully demonstrates the expansion of the use of the "Blue Button" application to enable veterans to download their patient information from providers outside the VA.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
"If not properly implemented, telework may introduce new information security vulnerabilities into agency systems and networks," Office and Management and Budget Director Jacob Lew warns in a White House memo.
As a report of one of the worst digital assaults against the Pentagon surfaces, Deputy Secretary William Lynn III unveils a new Defense Department cyberspace strategy in which the Pentagon will more actively defend military and defense industry systems and networks.
By leveraging infrastructure that exists, a DoD-DHS-private sector cyber pilot suggests the nation can provide substantial additional protections across its critical infrastructure for only a fractional increase in cost.