Access your Pro+ Content below.
Cybersecurity's profile rising under Obama
This article is part of the March 2009 issue of Information Security magazine
The lexicon in Washington around cybersecurity is changing. In the coming weeks, you're going to hear a lot about offense and defense for instance, and it will have nothing to do with the Redskins. It will have to do with militarizing cybersecurity, and making critical infrastructure, and federal and public networks strategic assets. While previous administrations have treated cybersecurity with policies and toothless national strategies, indications are the Obama administration is going to elevate it beyond a paper exercise. Beyond the nonsensical distractions of the Obama BlackBerry, the president and those around him seem to appreciate importance of connectivity and the need for security and assurance to national security and commerce. Just about halfway through his first 100 days, Obama has already ordered Melissa Hathaway, senior advisor for the Director of National Intelligence, to conduct a review of the government's cybersecurity policies and processes, including the top secret Comprehensive National Cybersecurity ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
Columns in this issue
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Effective data classification in the enterprise requires a simple approach.