"We are providing a technical solution that will eliminate the need for a lot of cyber professionals because we just don't have enough of them," Zalmai Azmi says.
Can technology replace the IT security professional to safeguard government information systems?
Zalmai Azmi, the former Federal Bureau of...
"A key reason for these weaknesses is that NASA has not yet fully implemented key activities of its information security program to ensure that controls are appropriately designed and operating effectively," a GAO director tells Congress.
"The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously." - National Intelligence Director Dennis Blair
Former FBI CIO Zal Azmi, CACI International Senior Vice President for Global Strategic Law Enforcement and National
Just as spy agencies have intelligence analysts, the government needs to develop technically savvy cyber analysts as IT threats from foreign nations and criminal organizations grow, says a former...
In the Crossfire: Critical Infrastructure in the Age of Cyberwar, the survey of 600 IT and security executives from 14 countries, reveals which country - China, Russia or the U.S. - is most likely to launch a cyber attack against foreign digital assets.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Former FBI CIO Zal Azmi, Senior Vice President, CACI International
Attacks from China on Google and other corporate IT infrastructures just scratch the surface in regards to infiltration into America's critical information systems and networks, the former chief information officer of the Federal Bureau of...
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
How prepared is the financial services industry in the event of a cyber attack?
The Financial Services Information Sharing and Analysis Center (FS-ISAC), a national industry forum, will conduct Cyber Attack Against Payment Processes (CAPP), an exercise to measure the ability of financial institutions, payment...