New & Notable
Government IT Security Management News
May 15, 2014
Attorney Francoise Gilbert analyzes the White House big data initiative and the data security and privacy ramifications for enterprises.
February 17, 2014
Experts differed over whether the NIST cybersecurity framework provides critical infrastructure firms with the tools to defend themselves.
November 06, 2013
As reported HealthCare.gov security issues continue to accrue, one expert claims the website security concerns have been "overblown."
October 22, 2013
Delayed by the government shutdown, the preliminary NIST Cybersecurity Framework offers general best practices for critical infrastructure security.
Government IT Security Management Get Started
Bring yourself up to speed with our introductory content
Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. Continue Reading
The United States Secret Service (USSS) is a federal law enforcement agency mandated by Congress to carry out two sets of primary objectives: provide protection for designated sites and events as well as national and visiting leaders, and preserve ... Continue Reading
Expert Ernie Hayden explains how critical infrastructure organizations can use the NIST cybersecurity framework to assess, improve infosec practices. Continue Reading
Evaluate Government IT Security Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Should companies obtain U.S. security clearance to join the Enhanced Cybersecurity Services program? Mike Chapple offers his perspective. Continue Reading
Video: Securicon executive consultant Ernie Hayden discusses what the NIST cybersecurity framework got right, and how the document can be improved. Continue Reading
Expert Joseph Granneman details the MEHARI risk management framework and compares it to the ISO 27000 and NIST 800 series. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Government IT Security Management
Learn to apply best practices and optimize your operations.
Video: An expert says the NIST cybersecurity framework and encryption standards resulted from a thorough public vetting process. Continue Reading
The Federal Information Security Management Act (FISMA) is United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. Continue Reading
The U.S. Department of State developed a system for improving federal cybersecurity. Continue Reading
Problem Solve Government IT Security Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A security expert offers insights and advice for government security managers on implementing a continuous monitoring strategy. Continue Reading
While implementation of the Identity Ecosystem is a long way off, the benefits for projects such as electronic health records could be significant. Continue Reading
Taking on a new zero-trust model, many federal agencies are implementing insider threat controls at the user level. Continue Reading