Blog Posts Tagged with "FISMA"
March 27, 2012 Added by:Headlines
"Federal Departments and Agencies must defend their information systems in a resource-constrained environment, balancing system security and survivability while meeting numerous operational requirements requires robust risk management," said Schmidt...
March 07, 2012 Added by:David Navetta
NIST notes that many of the changes were driven by particular security issues and challenges requiring greater attention including, insider threats, mobile and cloud computing, application security, firmware integrity, supply chain risk, and advanced persistent threats...
February 23, 2012 Added by:Headlines
"The proposed legislation would enable DHS to be more effective and efficient in its protection of federal networks by clarifying DHS’ authorities in this space and enabling better sharing of cybersecurity information from other federal agencies to DHS..."
February 21, 2012 Added by:Headlines
The events appear to be a comedy of errors, where during the long process involved in awarding contracts, critical security requirements were not enforced. As the federal government races to outsource in an effort to cut costs, the risk of oversights become more probable...
The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?
January 10, 2012 Added by:Headlines
The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...
October 04, 2011 Added by:Headlines
"Weaknesses in information security policies and practices at 24 major federal agencies continue to place... sensitive information and information systems at risk... reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years..."
April 18, 2011 Added by:Anton Chuvakin
Configuring tools needs to happen after the policy is created. Goals first, infrastructure choices second. In case of privacy and other regulations on top of FISMA, the legal department should also have their say, however unpalatable it may be to the security team...
April 14, 2011 Added by:Anton Chuvakin
FISMA emphasizes the need for each Federal agency to develop, document, and implement an organization-wide program to secure the information systems that support its operations and assets. Here is what is likely needed for a successful FISMA-driven log management implementation...
April 12, 2011 Added by:Headlines
"Google can’t be under the misimpression that FISMA certification for Google Apps Premier also covers Google Apps for Government. If that were the case, then why did Google, according to the attachments in the DOJ brief, decide to file a separate FISMA application?"
March 08, 2011 Added by:PCI Guru
As a new technology matures its security posture matures. With a more mature security posture, the lower the likelihood that a security incident will occur. However, the time it takes for that security maturity to occur can take quite a while and that is where organizations are at the highest risk...
February 24, 2011 Added by:Anton Chuvakin
Is continuous compliance a reality at your organization? Are you doing something 9, 6, 3 months before the annual PCI DSS assessment? Do you meet the auditor once a year? Or do you make an effort to stay compliant?
October 30, 2010 Added by:Kevin L. Jackson
Showcasing the positive progress of Federal Government Agencies and their strategic partners in meeting the goals of their Mission Programs. This issue, Cloud Computing in Government, features the Trends and Best Practices on Cloud Computing in Government...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013