Wilshusen's investigations, audits and reports for the GAO, the investigative arm of Congress, and his numerous testimonies before Congressional panels help shape legislation and government policy on securing federal data and systems.
Social and behavior research should help the federal government better plan its cybersecurity defenses, says Rep. Daniel Lipinski, chairman of the House Science and Technology's Research and Science Education Subcommittee.
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
Drafts of both measures are in flux, yet find common ground on requiring real-time metrics to verify safety of IT assets and pre-configured security controls on purchased technology.
Restructuring would have elevated cybersecurity within the lab, but critics worried such as shift would have diluted IT security research and weaken the computer security unit's brand.
Army Biometrics Taskforce Director Myra Gray sees biometrics as the best identifier of individuals but shouldn't be employed alone as means to shield people's identities from those who would cause harm.
Information assurance is a topic atop many agendas these days, starting with the president's own cybersecurity initiative. But what is the state of information assurance education?
Dr. Eugene Spafford of Purdue University is one of the icons of security education, and in this exclusive interview he...
CIO Robert Carey, in his blog, sets out six goals for his troops: embracing technology, adopting industrial-age thinking, social media as a tool to build trust, adopting security, going green and recruiting successors.
The same biometric tool to identify a friend or foe in combat can be repurposed back in the states to help secure military installations, says Biometrics Task Force Assistant Director Lisa Smith.
Tokenization or end to end encryption - which solution will win the hearts of data protectors in the race to secure data?
A recent study conducted by PriceWaterhouseCoopers on behalf of the Payment Card Industry Security Standards Council shows that end to end encryption and tokenization are the top choices for...
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
Congress should consider enacting legislation allowing the government to regulate how the private sector handles and stores data to battle the growing problem of data breaches, Rep. Yvette Clarke says.
NIST IT Lab Director Cita Furlani says the agency is ready to answer the call to develop new ways to measure IT security as Congress moves toward changing the way to determine the safety of federal information systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.