Building an effective security team boils down to two critical factors: the security leader who understands the mission and has the ability to find and manage the right people with the right skills to execute.
After two failed attempts, the House approves a bill that includes provisions for the first major restructuring of the National Institute of Standards and Technology in a generation.
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
"The use of cyber attacks is not by definition warfare, just like shooting somebody in the streets isn't warfare or using a gun isn't warfare," Surviving Cyberwar author Richard Stiennon says.
"Established models of deterrence do not wholly apply to cyber. We need a deterrent structure that fuses offensive, defensive, and intelligence operations to meet current and future threats."
A North Carolina urgent care center has paid a $50,000 settlement because its patient information was disposed of in a dumpster last year in violation of state law.
Secretary of Defense Robert Gates, at a ceremony giving Army Gen. Keith Alexander his fourth star, reemphasized the limits of a new cyber military command in helping safeguard civilian IT systems.
With risk management increasingly recognized as a core competency, the role of the chief information risk officer (CIRO) emerges as a new, strategic opportunity for security leaders.
During his tenure as national intelligence director, Dennis Blair recognized the synergy between national security and economy security, and advocated initiatives that protected government and business systems.
Congressional leaders have vowed to get the much awaited financial regulatory reform bill passed and in front of President Obama before the Fourth of July. Yet, reform legislation as it's currently written will not prevent future financial crises, say some experts.
The legislation would replace the paper-compliance process established under the Federal Information Security Management Act eight years ago with one relying on the continuous monitoring of agencies computer assets.
Veterans Affairs CIO tells a House panel that the VA has taken significant steps to prevent further IT security breaches that have plagued the agency, but auditors testify that the department faces alarming consequences because of a lack of security controls.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.