Senate intel panel approves legislation to increase Congress' oversight of cybersecurity as the administration ramps up new federal cybersecurity programs.
The swine flu, H1N1, has now killed more than 700 people around the world since the first outbreak began four months ago -- a jump of at least two-thirds from the last official death toll figure of 429 from the World Health Organization (WHO) earlier in July.
Information security - it's now a major national priority, and it's also the subject of a new Master's of Science program at East Stroudsburg University. This unique, online graduate program debuts on Aug. 31, and in an exclusive interview ESU professor N. Paul Schembari discusses:
The program's unique...
Federal CIOs, CISOs and IT hiring managers express less satisfaction with applicants' qualifications than do government HR recruiters, a new report finds.
As employees seek to use the latest IT on the job, it's incumbent for CISOs to figure out how to secure these technologies. NASA's Jerry Davis doesn't like to say, "no."
Consequences from cyber attacks aren't as devastating as many Washington insiders maintain, and the way government safeguards critical digital assets should parallel those it uses to defend the physical world, a noted IT expert says.
Persistent weaknesses in IT security practices threaten the confidentiality, integrity and availability of critical information systems used to support the operations, assets and personnel of most federal agencies, GAO says
Sen. Gillibrand: Existing international cybersecurity agreements focus only on issues relating to cyber crime and common operating standards and have not been signed by countries from which cyberattacks may be launched.
State Department matches its reported security incidents against 20 most critical cybersecurity controls, and employs that knowledge to proactively defend its IT systems and networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.