Dickie George, technical director of the National Security Agency's Information Assurance Directorate, characterizes the balancing act as a race against those who would do us harm. Who's winning the race?
As the government adds new applications to its information systems, the more openings it creates for attackers to gain access, creating a continuing battle between IT security professionals charged with safeguarding the systems and those seeking to cause them damage.
"The more functionality that's there, the more...
The National Institute of Standards and Technology characterizes its new guidance released this past week as transformational, and no one can speak more authoritative about it than Ron Ross, NIST's highly regarded senior computer scientist, information security researcher and FISMA implementation project leader who...
The fact that new technologies and trends present new threats to government information systems isn't new, but research from the privacy and IT security think tank Ponemon Institute links particular technologies or trends to specific vulnerabilities.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Many of our notions of warfare are based on destroying the other side and that simply doesn't apply in the cyberwar, Martin Libicki, senior management scientist at the think tank RAND Corp., says in an interview.
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
Seattle's IT security office had little choice but to secure as best it can the city's IT systems from potential threats posed by social networks. The mayor and city council members just began to use them.