White House sees the elimination of half of the federal government's 2,000 top-level .gov domains over the next year. OMB deems many sites as redundant, outdated and hard to use with poorly maintained content.
With so much critical information being exchanged today via e-mail, now is the time to deploy next-generation e-mail encryption solutions, says Bob Janacek, CTO and founder of DataMotion.
Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
A star-studded lineup of top administration officials including four cabinet secretaries and three other senior executives announced the new international strategy, emphasizing the importance of cybersecurity to American foreign policy.
More than just Facebook friends, today's Chief Information Security Officer needs to connect and collaborate with key corporate allies who can influence the enterprise risk and security practices within any organization.
A star-studded lineup of top U.S. officials including four cabinet secretaries and three other senior executives announced the new international strategy, emphasizing the importance of cybersecurity to American foreign policy.
"We took our understanding of the tools, tradecraft and techniques used by these malicious actors, and converted it into actionable information that ... would lower their risk to the type of attack we saw at RSA," DHS Secretary Janet Napolitano says.
"Although we have made good progress in creating information sharing entities, to share information securely and efficiently, we have not adequately tackled the critically important issues associated with the timeliness and completeness of information," Financial Services Sector Coordinating Council Chair Jane Carlin...
Altra Federal Credit Union developed a calculated strategy before moving to the cloud -- advice all financial institutions should follow, says Brian Boettcher, VP of IT, who shares his lessons learned.
Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.
"We really need to speak the language of business and focus less on the language of IT, and that involves risk management" Iowa CISO Jeff Franklin says. "You really need to target those resources to your most critical systems."
Former New York State CISO Will Pelgrin is expanding his influence over information security nationwide as chief executive officer of the newly revised Center for Internet Security that encompasses MS-ISAC and the U.S. Cyber Challenge.
The Defense Department hopes to prevent future WikiLeaks-style breaches by employing public key infrastructure-based controlled access cards, but that solution won't be fully in place until mid-2013, DoD CIO Teresa Takai says.
Iowa CISO Jeff Franklin explains how collecting real-time information helps the state information security office transition its focus from technology to risk management.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.