The National Institute of Standards and Technology's Computer Security Division releases two documents, a guide to enterprise telework and remote access security and a draft of proposed guidance on testing software security vulnerabilities.
A senior DHS officials tells Congress that it would be difficult for the government to remove critical national IT infrastructure elements from the Internet.
Dan Chenok, chairman of a government IT advisory panel, explains why the 35-year-old Privacy Act must be updated to bring government IT into the 21st century.
Developing the right curriculum provides another challenge in the relatively young field; there isn't widespread agreement about what technical content must be covered
The World Health Organization (WHO) on Thursday made the decision to move from phase 5 to phase 6, making the H1N1 flu virus the first in 41 years.
Also called "swine flu," the influenza virus that killed 12 people in the US and has been reported in all 50 states has also infected nearly 30,000 people in 74...
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
Experts call for less reliance on classified research and propose new ways for government, business and academia to share R&D findings that would enhance cybersecurity.
Cyberspace command to provide combat-ready forces trained and equipped to conduct sustained cyber operations to be fully integrated with the Air Force's air and space operations.
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
Embezzlement has become the nation's favorite financial crime -- and losses attributed to embezzlement are greater than those from all other financial crimes combined. Understanding the crime of embezzlement is critical to every investigator. In this exclusive interview in advance of his new webinar series, Dana...
The government is set to ramp up the use of red-team assaults to test vulnerabilities of civilian agencies' IT systems, something Defense and intelligence agencies have done for years. Here's the transcript of our chat with Tony Sager, who heads a National Security Agency group that conducts red-team assaults.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.