As the government adds new applications to its information systems, the more openings it creates for attackers to gain access, creating a continuing battle between IT security professionals charged with safeguarding the systems and those seeking to cause them damage.
"The more functionality that's there, the more...
The National Institute of Standards and Technology characterizes its new guidance released this past week as transformational, and no one can speak more authoritative about it than Ron Ross, NIST's highly regarded senior computer scientist, information security researcher and FISMA implementation project leader who...
The fact that new technologies and trends present new threats to government information systems isn't new, but research from the privacy and IT security think tank Ponemon Institute links particular technologies or trends to specific vulnerabilities.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Many of our notions of warfare are based on destroying the other side and that simply doesn't apply in the cyberwar, Martin Libicki, senior management scientist at the think tank RAND Corp., says in an interview.
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
Seattle's IT security office had little choice but to secure as best it can the city's IT systems from potential threats posed by social networks. The mayor and city council members just began to use them.
Interview with David Matthews, Deputy CISO, City of Seattle
David Matthews, like other government information security officials, knows the security problems social networks present. And like his cohorts in municipal, state and federal governments across the nation, Matthews - deputy chief information security...
The assessment employed an all-hazards approach to identify and prioritize national-level risks to critical IT functions. It also highlights strategies to address those risks and enhance the resiliency and security of the nation's IT sector.