The cybersecurity czar must get agencies heads to ignore parochial interests to achieve the common goal to rid the IT security threat, says Tom Stanton, a fellow at Johns Hopkins' Center for the Study of American Government.
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;v
Potential career paths in cybersecurity....
The National Institute of Standards and Technology's Computer Security Division releases two documents, a guide to enterprise telework and remote access security and a draft of proposed guidance on testing software security vulnerabilities.
A senior DHS officials tells Congress that it would be difficult for the government to remove critical national IT infrastructure elements from the Internet.
Dan Chenok, chairman of a government IT advisory panel, explains why the 35-year-old Privacy Act must be updated to bring government IT into the 21st century.
Developing the right curriculum provides another challenge in the relatively young field; there isn't widespread agreement about what technical content must be covered
The World Health Organization (WHO) on Thursday made the decision to move from phase 5 to phase 6, making the H1N1 flu virus the first in 41 years.
Also called "swine flu," the influenza virus that killed 12 people in the US and has been reported in all 50 states has also infected nearly 30,000 people in 74...
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
Experts call for less reliance on classified research and propose new ways for government, business and academia to share R&D findings that would enhance cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.