It's a scene out of the movies: a team of hackers attacking key federal IT systems, creating havoc, with defenders countering to keep the computers up and running.
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...
Experience shows that federal government agencies improve their security posture and reduce IT support costs by complying with the Federal Desktop Core Configuration (FDCC). Standardizing agency desktop configurations has proved very effective in limiting agencies' security vulnerabilities, simplifying issue...
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
Information Security is among the top priorities for departmental and agency chief information officers, and no one knows that better than Navy CIO Robert Carey, who carries the double duty of co-chairing the federal CIO Council's Committee on Information Security and Identity Management.
In this first of two parts...
Navy CIO Robert Carey was among the first federal CIOs to embrace blogging as a way to keep in touch with his various constituencies, including officers and sailors. Carey believes steps can be taken to embrace new technologies while maintaining security.
In this second of two parts of an exclusive interview,...
What's the rush?
Legislation to create the post of White House cybersecurity advisor who would report directly to the president, introduced earlier this week by Sens. Jay Rockefeller, D.-W.Va., and Olympia Snowe, R.-Maine, may prove to be a great idea. Yet, was the legislation introduced too soon?
"Knowledge is the currency of the future," says Sidney Pearl, Global Director of Enterprise Security Solution management for the Unisys Global Financial Services business.
And according to the latest Unisys Security Index, Americans are getting much smarter - and more demanding - about the basic information...
As federal agencies ponder whether to use cloud computing--the ability to access applications and data on servers over the Internet--the big security challenge isn't necessarily technical, employing the right technologies to assure the protection of data. What could prove to be an obstacle is certifying host IT...
Chief of Computer Security Division Describes New Challenges
Computer scientists at the National Institute of Standards and Technology are actively working on a number of projects aimed at helping federal agencies secure their IT systems.
Helping direct those projects is Curtis Barker, chief of the Computer...
Activity at the State Level Points Toward a Federal Data Breach Notification Law
Data privacy legislation -- the trend started in California and is being discussed heatedly in Massachusetts today. Data breach notification and privacy laws have now been enacted in 40 separate states, and government observers think...
A figure bandied about a lot in recent months is $1 trillion. That's how much the Congressional Budget Office projects the nation's deficit could grow each year if much of President Obama's budget plan is enacted by Congress.
A big predicament the government faces is the high cost to fix IT security problems on federal government legacy systems that steals money away from the research needed to build new, secure systems.
A big complaint about the Federal Information Security Management Act (FISMA) is that agencies complying with its provisions merely prove they're following processes aimed at securing information systems, but they don't necessarily prove the systems are indeed secure.
In an exclusive interview, Ron Ross, the...
Tom Davis wrote the original Federal Information Security Management Act in 2002, and says the legislation has served the government and nation well. The one-time powerful chairman of the House Government Reform Committee, which provides oversight on information technology matters, feels it's time for Congress to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.