The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
Cloud computing is among the hottest topics in the federal government, with its efficiencies promising to save agencies - and eventually taxpayers - money. Despite its attractiveness, few agencies have implemented any type of cloud computing initiative, mostly because of IT security concerns.
Gilligan helped initiate the program that requires PCs be preconfigured with specified security controls, and discusses the cultural challenges the government faces in expanding that practice to other technologies.
Cloud computing is a nebulous concept. It means one thing to one person and something else to another.
A team of computer scientists at the National Association of Standards and Technology (NIST) has come up with a working albeit long definition of cloud computing: "a pay-per-use model for enabling available,...
Defending against attacks on federal IT systems along with making them more efficient are behind the increased spending for fiscal 2010, which begins Oct. 1.
A new whitepaper on remote management for Thales HSM 8000 users
With data center consolidation, it is increasingly common for management of the data center to be at some other remote location. Flying HSM administrators to HSM locations to perform vital security functions which require their physical presence is...
Cloud computing is among the hottest topics in the federal government, with its efficiencies promising to save agencies and eventually taxpayers money. Despite its attractiveness, few agencies have implemented any type of cloud computing initiative, mostly because of IT security concerns.
The Defense Information...
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly ¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...
Experience shows that federal government agencies improve their security posture and reduce IT support costs by complying with the Federal Desktop Core Configuration (FDCC). Standardizing agency desktop configurations has proved very effective in limiting agencies' security vulnerabilities, simplifying issue...
Melissa Hathaway, in her remarks on the 60-day study she conducted for President Obama, didn't explain how U.S. cybersecurity should be governed, even if it's based in the White House.
New guidance on enterprise password management from the National Institute of Standards and Technology is aimed at helping federal government agencies mitigate common threats against character-based passwords.
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.