House GOP members, including Texan Mike McCaul (pictured), are set to gain influence on IT security matters as they're poised to take over the chairmanships of key committees with cybersecurity oversight.
The 90-page document defines common security and risk assessment requirements that qualified private contractors must meet to provide cloud computing services to federal agencies.
Indiana Attorney General Greg Zoeller has sued health insurer WellPoint Inc., alleging the firm took too long to notify Indiana residents affected by a health information breach.
Richard Oliver says globalization and the advent of the Internet have been two of the most influential technology innovations to hit banking over the last three decades. But a number of outdated card technologies, such as the magnetic stripe, lingers and is exposing the payments industry to fraud.
Could methods employed by the World Health Organization to quarantine people to prevent the spread of deadly diseases be a roadmap on how to prevent virtual viruses from spreading in the cyberworld?
The final version of PCI version 2.0 has just been released. It takes effect Jan. 1, but impacted entities have until Dec. 31, 2011, to become fully compliant.
Card fraud, globalization and emerging technology are pushing U.S. merchants and card issuers to take closer looks at the EMV chip standard, and the PCI Security Standards Council is helping to lead the charge.
By exploiting high-risk vulnerabilities, hackers could attack public-facing computers to enter the websites and gain access to sensitive data, such as password, take control of a server and attack other computers on DOT's networks, DOT's IG says.
Originally nominated by President Obama in March, Takai's confirmation was held up when a Defense Department cost-saving reorganization eliminated the unit in which the CIO served as an assistant secretary.
The National Institute of Standards and Technology issues NIST Special Publication 800-142: Practical Combinatorial Testing, a method aimed at cutting cost and increasing the effectiveness of software testing for many applications.
Following is the latest state-by-state list of academic institutions selected and approved by the NSA and DHS as Centers of Academic Excellence in information assurance.
Sen. Charles Grassley of Iowa, the ranking Republican on the Senate Finance Committee, requested the audit after the loss of the Wright Brothers' original patent and maps for atomic bomb missions in Japan.
"There is no scary part in the process when it's all well thought out and planned," says George Tumas, SVP and CIO of internet services development at Wells Fargo.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.