Blog Posts Tagged with "Government"
January 14, 2011 Added by:Headlines
Blacklisting by the Treasury Department is equivalent to marking an individual or group on par with terrorist organizations, and would bar U.S. citizens and companies from doing business or providing any material support whatsoever for the rogue whistleblower organization...
January 13, 2011 Added by:Headlines
A classified report on military operations provided to Congress by he Pentagon failed to disclose the military's use of cyber-based operations. The Pentagon's Michael Vickers, replied by questioning whether or not cyber ops are covered by the law that dictates what should be covered in the reports...
January 10, 2011 Added by:Kevin L. Jackson
The National Institute of Standards and Technology (NIST) has been designated by Federal Chief Information Officer Vivek Kundra to accelerate the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines..
January 10, 2011 Added by:Headlines
There is a clear mandate for a public-private partnership - led on the government side by DHS - but supported by all elements of the U.S. government, to include federal, state and local organizations represented here today...
January 10, 2011 Added by:Headlines
Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...
January 08, 2011 Added by:Danny Lieberman
Yes – there is apparently a White House directive to keep Wikileaks documents off Federal networks – according to a directive from the White House Office of Management & Budget on the treatment of classified documents...
January 07, 2011 Added by:Infosec Island Admin
The document cited in this article, "M-11-08, Initial Assessments of Safeguarding and Counterintelligence Postures for Classified National Security Information in Automated Systems", was in fact not "leaked", as the article states...
January 07, 2011 Added by:Headlines
The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...
January 07, 2011 Added by:Bill Gerneglia
The federal Office of the Inspector General found significant failings in the General Services Administration’s IT security systems and procedures in a December review of the agency, including configuration management, audit logging, monitoring, and encryption of data on agency laptops...
January 04, 2011 Added by:Headlines
Noted cyberwarfare expert John Wheeler's body was discovered on New Years Eve in a Delaware landfill. Wheeler was an expert in cyberwarfare and counter-ops technologies, and advised the military on the establishment of Cyberspace Forces as the Special Assistant to the Secretary of the Air Force...
January 02, 2011 Added by:Kevin L. Jackson
2011 will be the breakout year for GovCloud. Pressure to reduce budget, pressure to manage resources better, and the political pressure of the next presidential election will combine to accelerate adoption. The GSA IaaS groundwork has been laid and new policies are just about ready to be released...
January 02, 2011 Added by:Headlines
At issue is how best to classify material in an effort to prevent further breaches, while also maintaining post-9/11 efforts to increase information sharing efforts between multiple government agencies charged with defending the nation from future terrorist attacks...
December 30, 2010 Added by:Headlines
"We have to be careful about what institutions take the lead. The Chinas, the Irans, the Saudi Arabias of the world want to impose a territorial vision of control over cyberspace -- and if the ITU got its wishes, that's essentially what would happen..."
December 28, 2010 Added by:Dan Dieterle
This is a change in policy from trying to keep people out, to monitoring and limiting the damage done when they do get in. And get in they have, numerous reports of large corporations, government, and military breaches have made headline news over the years...
December 22, 2010 Added by:Headlines
The omitted language includes the creation of White House based office to coordinate cybersecurity efforts and the creation of a Federal Cybersecurity Practice Board to enforce Federal Information Security Management Act compliance and implementation of NIST recommendations...
December 21, 2010 Added by:Headlines
Cyberspace is fundamentally a civilian space. There are some who say cybersecurity should be left to the market, and there are some who characterize the Internet as a battlefield. Both the market and the battlefield analogies are the wrong ones to use...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013