Homeland Security's U.S. Citizenship and Immigration Services IT systems are vulnerable to insider threats, according to a report by the Insider Threat Center at CERT, part of the Software Engineering Institute at Carnegie Mellon University.
The latest Government Accountability Office report reflects the complexity of securing key IT systems: The administration has come far the past two years, but much more work remains to be done to secure effectively the nation's critical information infrastructure.
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.
Think your data is secure? Think again.
If you are sending data over a service provider's network, then you need to know: Current Wide Area Network (WAN) technologies offer no inherent data protection. It's time for you to take matters into your own hands to ensure your data is secure.
View this FREE webinar to...
"Until the missing elements are addressed," the GAO audit said, "there is an increased risk that smart grid implementations will not be secure as otherwise possible."
The General Services Administration needs to strengthen its IT security program in four key areas, the GSA inspector general says in its latest information security audit.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime.
Register for this webinar to receive first-hand advice from a veteran anti-money laundering investigator on:
Key...
Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime.
Register for this webinar to receive first-hand advice from a veteran anti-money laundering investigator on:
Key...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.