Email Alerts
-
Security Blog Log: Was the analyst a VA scapegoat?
A scathing report on May's massive Veterans Affairs data theft causes some to ask who deserves the most blame: the analyst or his supervisors? Column
-
Security Bytes: State Department probes computer break-ins
Meanwhile, Adobe fixes security flaws in Acrobat and Reader while Juniper Networks fixes security flaws in its JUNOS program running on M-series, T-series, and J-Series routers. Article
-
encryption
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. Definition
-
When access management becomes rocket science
Security can be a hard sell beyond the IT realm, even for security pros at NASA. But nothing motivates people like regulatory pressure and a fear of being the next data breach headline. Article
-
FISMA essentials for information security practitioners
This tip provides an overview of the Federal Information Security Management Act (FISMA) and what information security professionals need to do in order to comply. Tip
-
Fighting the uphill battle against renegade apps
Experts say keeping unsanctioned apps and technologies off company computers is a difficult battle to win. But protecting the network is possible. Article
-
Personal data on 26.5 million veterans stolen
The stolen information included names, Social Security numbers and dates of birth for the military veterans and some spouses. Article
-
PING with Jane Scott Norris
In an interview with Information Security magazine, Jane Scott Norris, Department of State's first CISO, offers some insight on what it takes to become a CISO. Information Security maga
-
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international b... Executive Briefing
-
Opinion: Investigating the FBI's 'invalid' security survey
Should the FBI be in the security survey business? Columnist Ira Winkler says not only does the bureau's 2005 FBI Computer Crime Survey lack statistical validity, but also could create a false perception that security technology is ineffective. Column
Security Management Strategies for the CIO