A Congressman is citing the recent theft of an unencrypted laptop containing health information on 616 veterans as evidence that the Department of Veterans Affairs is not doing enough to protect information.
"We need to find issues that are of mutual interest, and work around those, what I call the low-hanging fruit, and build these relationships, build this dialogue, and then later address the others if possible," Sarkissian says.
A CD-Rom containing the personal identifiable information was in one of three laptops stolen from the Morrow, Ga., offices of Serco Inc., a government contractor based in Reston, Va.
House leaders, including Science and Technology Committee Chairman Bart Gordon, withdrew a bill that would have restructured NIST after Republicans sought to amend it to ban pay to workers caught watching pornography.
"Achieving the objective of near real-time risk management means that organizations must have the flexibility to tailor their assessment activities based on where the information system is in its life cycle," NIST's Ron Ross says.
Cyber thieves shuttering ATMs and enemies disrupting battlefield IT systems are among the concerns of the California congresswoman whose influence on cybersecurity is growing as chair of the House Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities.
With the recent sentencing of the last of Albert Gonzalez' co-conspirators in the TJX and Heartland data breaches, a long, hard criminal investigation comes to a close.
Career Profiles features tips from senior leaders who have made it to the top of the information security profession. Here they discuss their education, keys to success and proven strategies for advancement.
Arguably no one has more influence over federal cybersecurity than Army Gen. Keith Alexander, the National Security Agency director, who won Senate confirmation to also be the first head of the military's cyber command.
The curriculum vitae of the new chief information office at the Defense Information Systems Agency includes one item not commonly found on most CIOs' resumes: entrepreneur.
The co-chairs of the House Cybersecurity Caucus, including Rep. Jim Langevin, introduce legislation that would grant authority to a Senate-confirmed cyberspace director to review and approve the IT security budgets of federal civilian departments and agencies.
Draft legislation began circulating through the corridors of the Capitol complex that would establish - in the words of its sponsors - meaningful privacy protections for Internet users, which they say is particularly important as businesses begin to adopt cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.