The arrest is part of a continuing investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.
There are significant hard and soft benefits for government agencies to gain by investing now in solutions built around Trustable Identities, says Mike Ozburn, principal of Booz Allen Hamilton.
A retired Army lieutenant colonel, Vickers had headed U.S. CERT for nearly two years, first as acting director after Mischel Kwon resigned and then as permanent director since April 2010.
Policies for protecting the privacy of patient information that's used for research will be considered in the context of broader new federal guidelines for protecting human research subjects.
Though America remains dominant on land, sea and air, technical and economic barriers to gain entry in cyberspace are much lower for adversaries, and as a result, place the United States' networks at great risk, GAO says.
Dickie George of the National Security Agency has one word to describe the state of information security education today: "Spotty." And this state must improve if we hope to fill all the growing demand for security pros.
You don't need to agree with assailants' motivation, most of us don't. But you must understand what's behind their action to help defend against their intrusions.
"Consumer notification is often hampered by the fact that companies must first determine their obligations under 47 different state regimes," says Rep. Mary Bono Mack, R-Calif., the subcommittee's chair and bill's sponsor.
If enacted,the bill that's heading to the House floor would require increased coordination and prioritization of federal cybersecurity R&D activities and the development of cybersecurity technical standards. It also would strengthen cybersecurity education and talent development and promote industry partnership...
NIST's Ron Ross points out that its seminal security control guidance, Special Publication 800-53, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.
The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
With such high demand for security professionals, employers must be wary of the prospects they consider. People are known to inflate their resumes and claim knowledge they don't have.
"Privacy and security controls ... are complementary and mutually reinforcing in trying to achieve the privacy and security objectives of organizations," NIST Senior Computer Scientist Ron Ross says.
The FBI said the suspects hacked the website of payment service PayPal, an intrusion claimed by Anonymous for halting payments to WikiLeaks, which had leaked some quarter-million diplomatic cables.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.