In discussing Colorado's foray into cloud computing, Colorado Chief Information Security Officer Seth Kulakow discusses the demands the cloud presents governments and offers advice for IT security professionals on building their careers.
Whitehouse Cybersecurity Coordinator Howard Schmidt used wit to share his wisdom about healthcare information security in a rambling, folksy keynote address this week. He stressed that healthcare organizations of all sizes need to take security more seriously.
The Treasury Department blamed a cloud computing provider for the disruption of its website that provides the Internet face of the Bureau of Engraving and Printing, the agency that prints United States currency.
The U.S. government's International Traffic in Arms Regulation (ITAR) governs the dissemination of a broad array of information. Among its requirements, ITAR prohibits disclosing or transferring regulated technical data to a foreign person, whether in the United States or abroad. Regulated information does not need to...
Listen to a round up of GovInfoSecurity.com's most fascinating content created in April, including:
Beyond Firewalls and Encryption: FAA Infosec Pilot Showcases Multi-Disciplinary Approach
Peter Mell: Speeding Cloud Adoption Through New FedRAMP Initiative
Bob Maley: Why I Spoke Publicly About Cyber...
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
The Federal Risk and Authorization Management Program would eliminate costly, duplication of effort often seen in acquiring outsourced systems and could speed government adoption of cloud services, FedRAMP Vice Chair Peter Mell says.