Blog Posts Tagged with "Federal"
The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?
January 10, 2012 Added by:Headlines
The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...
December 20, 2011 Added by:Bill Gerneglia
The FedRAMP was established to provide a standard approach to Assessing and Authorizing cloud computing services. FedRAMP allows joint authorizations and continuous security monitoring services for Government and Commercial cloud computing systems intended for multi-agency use...
December 16, 2011 Added by:Headlines
“Changes made to the document reflect changes in the state of the art. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security..."
December 07, 2011 Added by:Headlines
"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."
December 02, 2011 Added by:Headlines
"In an era of limited financial resources, better coordinated efforts to address both cybersecurity-specific and broader federal workforce challenges are crucial to cost-effectively ensuring that the government has the people it needs to continue to deal with evolving cyber threats..."
November 29, 2011 Added by:Headlines
"We are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs. Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability..."
November 28, 2011 Added by:Kevin L. Jackson
GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...
October 21, 2011 Added by:Headlines
"DHS says the newly created cybersecurity position will allow the department to better carry out its mission to create a safe, secure and resilient cyberspace... Weatherford will focus on ensuring robust cybersecurity operations and communications resilience for DHS..."
October 12, 2011 Added by:Marjorie Morgan
Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...
October 04, 2011 Added by:Kevin L. Jackson
Cloud computing is unique in its ability to address critical defense and intelligence needs. That’s why the cloud is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiency and incur cost savings...
October 04, 2011 Added by:Headlines
"Weaknesses in information security policies and practices at 24 major federal agencies continue to place... sensitive information and information systems at risk... reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years..."
September 27, 2011 Added by:Kevin L. Jackson
Security is an issue with client management interfaces with the public cloud provider. These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access...
September 22, 2011 Added by:Headlines
The revised guidance has been expanded to include more information on a variety of risk factors essential to determining information security risk, such as threat sources and events, vulnerabilities and predisposing conditions, impact, and likelihood of threat occurrence...
September 20, 2011 Added by:Kevin L. Jackson
Cloud outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. Security concerns have also slowed the widespread adoption of cloud computing...
September 19, 2011 Added by:Bill Gerneglia
It’s more than just a salary cut. Officials working for private companies also get bonuses, stock options and a better benefits package than those working in the public sector. So who in their right mind would tolerate the smaller paycheck in exchange for a bunch of headaches?
Join Trend Micro & SecurityWeek in Belle... Shah Alam on 12-06-2013
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013