"Achieving the objective of near real-time risk management means that organizations must have the flexibility to tailor their assessment activities based on where the information system is in its life cycle," NIST's Ron Ross says.
Cyber thieves shuttering ATMs and enemies disrupting battlefield IT systems are among the concerns of the California congresswoman whose influence on cybersecurity is growing as chair of the House Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities.
With the recent sentencing of the last of Albert Gonzalez' co-conspirators in the TJX and Heartland data breaches, a long, hard criminal investigation comes to a close.
Career Profiles features tips from senior leaders who have made it to the top of the information security profession. Here they discuss their education, keys to success and proven strategies for advancement.
Arguably no one has more influence over federal cybersecurity than Army Gen. Keith Alexander, the National Security Agency director, who won Senate confirmation to also be the first head of the military's cyber command.
The curriculum vitae of the new chief information office at the Defense Information Systems Agency includes one item not commonly found on most CIOs' resumes: entrepreneur.
The co-chairs of the House Cybersecurity Caucus, including Rep. Jim Langevin, introduce legislation that would grant authority to a Senate-confirmed cyberspace director to review and approve the IT security budgets of federal civilian departments and agencies.
Draft legislation began circulating through the corridors of the Capitol complex that would establish - in the words of its sponsors - meaningful privacy protections for Internet users, which they say is particularly important as businesses begin to adopt cloud computing.
Profiles of state chief information security officers who have grown from tacticians into strategic leaders. They share their experiences, responsibilities and challenges, offering advice to security professionals who aspire to similar leadership roles.
Federal CISOs are aggressively seeking well-trained and qualified IT security professionals. And to do so, they are turning to fresh college graduates.
The Federal Information Security Amendment Act also would require that the president's top cybersecurity adviser and the federal chief technology officer be confirmed by the Senate.
Two websites for the Bureau of Engraving and Print, the Treasury Department unit responsible for print United States currency, have been hacked, according to the blog of a security software vendor.
The Treasury Department blamed a cloud computing provider for the disruption of its website that provides the Internet face of the Bureau of Engraving and Printing, the agency that prints United States currency.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.