The US government is under constant attack from adversaries looking to breach and gain access to their systems. To ultimately ensure they have the best possible endpoint protection, the US military engages in staged cyber security challenges.
During a recent exercise, this US military command center discovered...
Office of Management and Budget Director Peter Orszag, who issued the guidance, says his office is sensitive to citizens' concerns and use of cookies by federal agencies must not compromise or invade personal privacy.
A new federal healthcare task force on privacy and security, which will hold its first meetings June 10 and 11, will initially focus on policies and standards for the exchange of health information.
"The potential for sabotage and destruction is now possible and something we must treat very seriously," says Army Gen. Keith Alexander, military commander and NSA director.
A CD-Rom containing the personal identifiable information was in one of three laptops stolen from the Morrow, Ga., offices of Serco Inc., a government contractor based in Reston, Va.
Draft legislation began circulating through the corridors of the Capitol complex that would establish - in the words of its sponsors - meaningful privacy protections for Internet users, which they say is particularly important as businesses begin to adopt cloud computing.
In terms of payments, privacy and third-party relationships, U.S. security leaders have much to learn from - and share with - their peers in the U.K. and elsewhere in the world.
Guidance on how organizations should protect the confidentiality of personal identifiable information, SP 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information, or PII, has been issued by the National Institute of Standards and Technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.