The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
"Privacy and security controls ... are complementary and mutually reinforcing in trying to achieve the privacy and security objectives of organizations," NIST Senior Computer Scientist Ron Ross says.
The FBI said the suspects hacked the website of payment service PayPal, an intrusion claimed by Anonymous for halting payments to WikiLeaks, which had leaked some quarter-million diplomatic cables.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
The Department of Veterans Affairs is offering a $50,000 prize to a developer who successfully demonstrates the expansion of the use of the "Blue Button" application to enable veterans to download their patient information from providers outside the VA.
"If not properly implemented, telework may introduce new information security vulnerabilities into agency systems and networks," Office and Management and Budget Director Jacob Lew warns in a White House memo.
To assist federal agencies with the implementation of CyberScope reporting, IBM Tivoli Endpoint Manager, built on BigFix technology, provides insight and control for endpoints with streamlined, automated capabilities for continuously monitoring and remediating security compliance
This white paper touches on:...
Download your complimentary copy of this report normally only available to Gartner clients. This current Magic Quadrant document offers a third party perspective of IBM's leadership and visionary position in the PCCLM space while providing an in-depth comparison against our perceived competition.
This report...
IBM Tivoli Endpoint Manager helps organizations automatically manage patches for multiple operating systems and applications across hundreds of thousands of endpoints regardless of location, connection type or status. In a world where seconds matter, Tivoli Endpoint Manager can be the difference between a successful...
As a report of one of the worst digital assaults against the Pentagon surfaces, Deputy Secretary William Lynn III unveils a new Defense Department cyberspace strategy in which the Pentagon will more actively defend military and defense industry systems and networks.
By leveraging infrastructure that exists, a DoD-DHS-private sector cyber pilot suggests the nation can provide substantial additional protections across its critical infrastructure for only a fractional increase in cost.
The move of paper-based transactional services online doesn't create just cost savings and efficiencies. E-Gov creates a "Trust Dividend," thanks to the use of trustable online identities - issued by private enterprise, and relied upon by government. Making this switch now will help your agency achieve the benefits of...
Booz Allen didn't specifically address what was breached, but the hacking group Anonymous says it pilfered a list of some 90,000 military e-mails address from the company's computers..
Often allies, Sens. John McCain, R-Ariz., and Joseph Lieberman, ID-Conn., find themselves at odds over McCain's call for the establishment of a temporary Select Committee on Cybersecurity and Electronic Intelligence Leaks.
The long-overdue HITECH-Act mandated
HIPAA compliance audit program will begin soon, with about 150 on-site audits of covered entities and business associates anticipated by the end of 2012.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.