Known as the Cloud First policy, Federal CIO Vivek Kundra has outlined a new policy in which one-quarter of the $80 billion the federal government spends on information technology would employ cloud computing solutions.
Attracting and retaining IT security professionals may be the No. 1 staffing challenge states face, but the numbers alone unveiled in a recent National Association of State Chief Information Officers survey don't tell the whole story.
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
Clinics applying for HITECH Act electronic health records incentive payments are getting a reminder about the importance of information security, says Robert Tennant of the Medical Group Management Association
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
Interest in cloud computing is on the rise, but security concerns linger. This white paper addresses how to mitigate those risks, including:
Developing a secure, holistic infrastructure that encompasses both physical and virtual computing systems;
Establishing high-level information security policies for...
Organizations investigating cloud computing must consider many different options, including public, private and hybrid clouds. And each approach poses different risks. This white paper addresses:
Choosing a cloud computing solution;
Addressing the risks associated with moving to the cloud;
Planning IT services...
Security professionals at organizations adopting cloud computing solutions must put in place policies, processes and relationships that will result in keeping enterprise data safe. This industry perspective recommends:
Adopting high-level information security policies as well as granular procedures and standards...
This paper proposes a four-layer model called the "security stack" as a
means to visualize the complexity of cybersecurity problems and see through
to comprehensive, effective solutions. The authors use the term "stack"
strictly as having similarities to other well accepted stacks where layers
deliver services...
Office of Management and Budget Director Jacob Lew issues a directive to require 5.7 million federal employees and contractors to use personal identity verification credentials to access federal IT systems and facilities by Oct. 1.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.