From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
In an exclusive interview, the cybersecurity advisor to three presidents explains how a lack of accountability hinders safeguarding federal IT and why officials who fail to properly assure government data often go unpunished.
Federal agencies want to employ cloud computing technology, but are hesitant because of information security concerns and existing government compliance regulations.
"Cloud computing is of great interest to the U.S. government, and it's seen as a great opportunity to promote efficiencies, but there is not...
As federal agencies ponder whether to use cloud computing--the ability to access applications and data on servers over the Internet--the big security challenge isn't necessarily technical, employing the right technologies to assure the protection of data. What could prove to be an obstacle is certifying host IT...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
The Department of Homeland Security is on the defense against the Conficker computer worm, releasing a tool it says can detect the malware on computer networks.
A sense permeates across the capital that major changes will soon occur on how the federal government secures its information systems.
As Congress revs up to reform information security processes for the first time in seven years, and the Obama administration is weeks into a 60-day review of cybersecurity policy,...
Canadian cybersecurity researches revealed this weekend the existence of a cyber espionage network, likely based in China, called GhostNet that employs malware when breaching computers worldwide, including those they consider high-value diplomatic, political, economic and military targets.
This is something that used to really get me going as an information security practitioner. Someone would forward me (and everyone else they knew) an email that had the most dire of warnings - "EMAIL VIRUS WILL WIPE YOUR HARD DRIVE - Do not open !!!"
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
The commission that produced the report Cybersecurity for the 44th Presidency may not disband, but instead continue to provide advice to the Obama administration and others willing to listen.
Citing the popular response the 96-page report has received since its release in December, commission co-chairman Harry...
The Influencers is a continuing series of profiles of the people who shape federal government information security and privacy policy.
Robert Carey
Chief Information Office, Department of Navy
Why He's an Influencer
Carey co-chairs the Federal CIO Council's Committee...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.