This week's top news and views: DHS, DoD to Jointly Tackle Cybersecurity; IT Security Evolution to Mimic Immune system; IT Joblessness at 5.1%; States Intimidated by Consensus Audit Guidelines.
NSA involvement in warrantless surveillance during the Bush years may have given the Obama administration pause in formalizing the working relationship between DHS and DoD, but any apprehension has since vanished.
Secretaries Janet Napolitano and Robert Gates work out an agreement in which DHS takes the lead in defending domestic networks while DoD and NSA expertise can be deployed to identify exploits aimed at critical U.S. systems.
Efforts by government and business to educate young people about careers in IT security will pay off, says former New York State CISO and Multi-State ISAC Chair William Pelgrin.
"Citizens don't have the authority to say no. Given that backdrop, I think states have a greater responsibility to protect those types of information," Nevada CISO Chris Ipsen says.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
With baby boomers reaching the retirement stage, and the first throngs of Gen Y entering the information security workplace, the profession is evolving - and gaining new definition.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
Investing in science, technology and math, not only will produce needed cybersecurity pros, but will generate stronger economic growth in the coming decade, says Patrick Gorman, former associate director of national intelligence.
Organizations today approach social media one of three ways: They embrace it, ignore it or are immobilized by it. The key to success is to manage the transition.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.