Streufert's work at the State Department is held as a model on how continuous monitoring and an innovative scoring mechanism can sharply reduce vulnerabilities threatening government IT systems.
Heartland Payment Systems, Radisson Hotels and Network Solutions have made the big headlines so far this year. But other data threats are out there, says Chris Novak of Verizon Business Investigative Response Team.
The Obama Administration has a heavy emphasis on information security, and already we're seeing greater attention paid to cybersecurity and FISMA reform. Now is the time for government agencies to benchmark and strengthen their information security programs.
Learn from security veteran Patrick Howard, CISO of the...
The E-Government Act, passed into law in December 2002, recognized that information security is essential to protect the nation's economic and national security interests. Title III of the E-Government Act, the Federal Information Security Management Act (FISMA), requires United States government agencies to develop,...
e-Brief: Public Sector Trends and Best Practices
Your ability to assure the effectiveness of your security programs - to protect sensitive data and critical systems - has a far reaching impact for your agency and all its constituents. Yet, in today's world of global access and awareness, government agencies face a...
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
The down economy pressures organizations to reduce operational expenses and discard many capital-intensive IT and security projects. What gets left behind often is a skeletal staff dealing with very basic day-to-day IT functions, with no time or resources to dedicate toward compliance, audit and core security...
Is 2009 the Year of the Insider Threat?
Last August's arrest of a Countrywide employee in California illustrates the potential impact of a single insider with access to sensitive information. The FBI charged the former employee with taking 2 million names and personal information from the mortgage bank and selling...
A consortium of federal agencies and private organizations has just released the first version of the Consensus Audit Guidelines (CAG), which defines the most critical cyber security controls to protect government agencies and critical infrastructure industries, including financial services.
This is a copy of a letter sent by the Bank of Fayetteville, Fayetteville, AR to a debit card customer on January 22. The bank sent the letter to inform the customer that the debit card may have been among those that were compromised as a result of confirmed unauthorized access to Heartland Payment Systems.
Exactly one week after the Heartland Payment Systems (HPY) breach was first announced to the public, the first lawsuit has been filed against the payments processor.
The class action lawsuit filed Tuesday by Chimicles & Tilellis LLP of Haverford, PA in the U.S. District Court for the District of New Jersey on...
Exactly how big was the Heartland data breach?
This is the great unanswered question since last week, when Heartland Payment Systems (HPY), a Princeton, NJ-based credit card processor, revealed that its computer systems had been breached, and an unknown number of credit card account numbers were exposed to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.