Many federal government agencies issue security clearances via the Department of Defense's Defense Security Service (DSS). With the automation of this clearance process, using the SF-86 electronic form, come security concerns for all stakeholders in the process. Learn how one defense contractor used Liquid Machines'...
Most organizations spend 30-50% more on compliance than they should 1. No matter the industry, with regulations such as GLBA, PCI, FISMA, SOX, and other regulations and mandates, it seems nobody is immune to scrutiny - but why spend so much more than what is necessary? In order to reduce the burden of an IT audit,...
Interview with SRA International CEO Stanton Sloane
Stanton Sloane read Gartner's projection that the information technology industry will fall under government regulation in another half-dozen years or so, a forecast he hopes will not occur. It's not surprising the chief executive of SRA International, one of the...
Ten years ago, the National Security Agency (NSA) started up the Centers of Academic Excellence program to encourage stronger information assurance programs at colleges and universities. Initially, there were 7 designated CAE schools.
Today, the ranks have swollen to over 100 CAE-designated schools, and information...
Most state chief information security officers manage information security from the 35,000-foot level, guiding government cybersecurity policy but not being involved in the day-to-day, hands-on implementation of safeguards. And, that presents a big challenging to state CISOs charged with protecting their governments'...
Gartner: IT Regs Will Be Enacted in 5 Years
Like the airlines, automotive, financial services, pharmaceutical and telecommunications industries, the government will soon - probably within the next half decade - begin to regulation the IT industry, IT adviser Gartner predicts.
"There's a trajectory that...
What keeps President Obama awake at night? Cybersecurity certainly bubbles to the top of his list. As fraudsters chip mercilessly away at the government's elastic perimeter, the nation's cyber infrastructure - and all the critical data it houses - lies at risk.
Besieged by fraud threats from all vectors, the Obama...
e-Brief: Public Sector Trends and Best Practices
Your ability to assure the effectiveness of your security programs - to protect sensitive data and critical systems - has a far reaching impact for your agency and all its constituents. Yet, in today's world of global access and awareness, government agencies face a...
Successful operations are a matter of life and death at the Department of Defense (DoD). But with increasing reliance on information technology, and cyber threats around every corner, the agency takes security very seriously. Hence, the DoD Information Assurance Certification and Accreditation Process, or...
Interview with National Science Foundation CIO George Strawn
It's not too often you find an IT leader praising FISMA, but National Science Foundation CIO George Strawn says his agency has made great strides in securing IT by following Office of Management and Budget guidance on the Federal Information Security and...
Jim Harper contends cyber terrorism does not exists, believing it's a creation of politicians, government contractors and pundits who try to make the problem of securing government IT bigger than it really is. Simply, it's a scare tactic.
"Cyber terrorism, in particular, cannot exist," says Harper, director of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.