Blog Posts Tagged with "Federal"

0ff0a77035f9569943049ed3e980bb0d

Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)

69dafe8b58066478aea48f3d0f384820

GSA Final Rule Requires Vendor Proof of Security

January 10, 2012 Added by:Headlines

The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Fed CIO: Minimum Security Standards Set for Cloud Providers

December 20, 2011 Added by:Bill Gerneglia

The FedRAMP was established to provide a standard approach to Assessing and Authorizing cloud computing services. FedRAMP allows joint authorizations and continuous security monitoring services for Government and Commercial cloud computing systems intended for multi-agency use...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Revision Expands Government Authentication Options

December 16, 2011 Added by:Headlines

“Changes made to the document reflect changes in the state of the art. There are new techniques and tools available to government agencies, and this provides them more flexibility in choosing the best authentication methods for their individual needs, without sacrificing security..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Cyber Security R and D Strategy Released

December 07, 2011 Added by:Headlines

"Sustained efforts in these areas will result in a more secure and trustworthy cyberspace. We invite researchers and innovators in industry and academia to join us in this effort. Together, we can maximize the benefits of research and accelerate their transition into the marketplace..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

GAO Blasts Federal Management of Cyber Security Work Force

December 02, 2011 Added by:Headlines

"In an era of limited financial resources, better coordinated efforts to address both cybersecurity-specific and broader federal workforce challenges are crucial to cost-effectively ensuring that the government has the people it needs to continue to deal with evolving cyber threats..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds Seize 150 Websites in Massive Holiday Sting

November 29, 2011 Added by:Headlines

"We are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs. Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability..."

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

GovCloud.com: New Hub for Government Cloud Computing

November 28, 2011 Added by:Kevin L. Jackson

GovCoud is the “go to” place for everything related to federal cloud computing. Our mission is to help federal organizations learn about, try and securely adopt cloud computing technologies. This site will provide a community hub for information dissemination and GovCloud best practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Taps Weatherford as Cybersecurity Lead

October 21, 2011 Added by:Headlines

"DHS says the newly created cybersecurity position will allow the department to better carry out its mission to create a safe, secure and resilient cyberspace... Weatherford will focus on ensuring robust cybersecurity operations and communications resilience for DHS..."

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Tracking Cyber Security Legislation Updates

October 12, 2011 Added by:Marjorie Morgan

Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Cloud Computing Solutions in Federal Agencies part 4

October 04, 2011 Added by:Kevin L. Jackson

Cloud computing is unique in its ability to address critical defense and intelligence needs. That’s why the cloud is critical to our national defense. As a bonus, cloud computing offers defense and intelligence agencies the ability to increase efficiency and incur cost savings...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

GAO: Federal Security Incidents Increased 650%

October 04, 2011 Added by:Headlines

"Weaknesses in information security policies and practices at 24 major federal agencies continue to place... sensitive information and information systems at risk... reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years..."

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Cloud Computing Solutions in Federal Agencies part 3

September 27, 2011 Added by:Kevin L. Jackson

Security is an issue with client management interfaces with the public cloud provider. These services are provided via the internet and permit access to a larger set of resources than traditional operating systems. Security risk can dramatically increase when this is combined with remote access...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Risk Assessment Guide for Federal Information Systems

September 22, 2011 Added by:Headlines

The revised guidance has been expanded to include more information on a variety of risk factors essential to determining information security risk, such as threat sources and events, vulnerabilities and predisposing conditions, impact, and likelihood of threat occurrence...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

Cloud Computing Solutions in Federal Agencies part 2

September 20, 2011 Added by:Kevin L. Jackson

Cloud outages can be a potential risk—and can have widespread implications for consumers of cloud services. This risk becomes even more severe if a mission-critical environment could be impacted. Security concerns have also slowed the widespread adoption of cloud computing...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Federal CIO Salaries Lag - Leads to Turnover

September 19, 2011 Added by:Bill Gerneglia

It’s more than just a salary cut. Officials working for private companies also get bonuses, stock options and a better benefits package than those working in the public sector. So who in their right mind would tolerate the smaller paycheck in exchange for a bunch of headaches?

Comments  (0)

Page « < 1 - 2 - 3 > »