As the government looks to deploy cloud computing securely, just-issued NIST guidance shows how agencies can pool resources to vet technologies and services for purchase and, in turn, save taxpayers millions of dollars, says Ron Ross, a NIST senior computer scientist.
Steve Elefant, CIO, Heartland Payment Systems
One theme repeated by every major Obama administration officials speaking RSA Conference 2010, the IT security conference held in early March in San Francisco, was the need for the government and business to work together to protect the nation's critical IT...
"Historically, there's been a dichotomy between network security on the one hand and investigative process on the other," FBI Director Robert Mueller says. "It has been a great divide between us but needn't be."
Robert Rodriguez, Chairman, Security Innovation Network
Robert Rodriguez thinks there are plenty of innovative ideas emanating from American entrepreneurs to secure information systems that those responsible for federal government cybersecurity haven't heard of.
Rodriguez is chairman of the Security Innovation...
Just one week on the job, Schmidt outlines the challenges he will face as the president's top IT security adviser and shares some of the experiences he had during his short tenure as cybersecurity coordinator with the State of the Net Conference attendees.
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
Former FBI CIO Zal Azmi, CACI International Senior Vice President for Global Strategic Law Enforcement and National
Just as spy agencies have intelligence analysts, the government needs to develop technically savvy cyber analysts as IT threats from foreign nations and criminal organizations grow, says a former...
"We want to make sure that critical new threat area that we're building a foundation of cooperation with our oldest ally as we tackle the critical challenges that cyber security poses," William Lynn says.
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders:
The New Year comes with fresh perspectives on priorities to be addressed by information security leaders.
To get a sense of what's top-of-mind, we went to three information security leaders:
Emil G. D'Angelo, International President of ISACA. He is also the senior Vice President overseeing the corporate data...