Legislation being drafted by an influential Republican House chairman to reform the Federal Information Security Management Act could, if enacted, reverse Obama administration policy on how IT security is governed in the federal government.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
"As an employee of a local government information security organization ... I implore you to consider a new approach to our joint efforts to secure information infrastructure."
NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.
Why must financial institutions pay more attention to risks posed by third-party payments processors? FDIC executive Michael Benardo explains the updated guidance in an exclusive interview.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
For years, security experts have advised users to wipe their hard drives before discarding them. About 100 owners of one brand of tablets may have wished they did.
The University of Hawaii has agreed to settle a class action lawsuit involving data breaches affecting about 96,000. It agreed to provide those affected two years of free credit monitoring and credit restoration services.
How can companies and IT security leaders keep a security breach from becoming a long-term problem and stop it from negatively affecting their customer base?
People, as much as anything else, are a critical aspect of information risk management, and businesses and government agencies must monitor employees - and educate them, as well - to thwart a potential threat from within.
President Obama uttered the term "cyber" only once in his 7,200-word State of the Union address Tuesday night, but that fleeting moment about an hour into the speech could prove significant.
The National Institute of Standards and Technology is seeking public comment on three draft interagency reports that provide guidance on the continuous monitoring of information systems for security vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.