The NIST cybersecurity framework is here: Now what?

Government IT Security Management

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Federal government pushes full disk encryption

    Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full disk encryption (FDE) products. 

  • Federal data security hampered by budget limits

    Cisco Systems surveyed 200 federal IT pros and found they are more confident about their security, but budget constraints and possible breaches are still a source of worry. 

  • Agency improves security grades under CISO's watch

    CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award. 

  • Feds get a D plus for data security

    An epidemic of data security breaches has swept across the federal government since early 2003, according to the House Committee on Government Reform. 

  • HSPD-12 proving to be a struggle for government agencies

    The deadline for U.S. Government agencies to begin to comply with Homeland Security Presidential Directive 12 (HSPD-12) is a little more than two months away, and experts say it's unlikely that most government agencies will make it. In fact, as Sue H... 

  • Transportation department data theft involves 133,000 records

    A Department of Transportation computer housing sensitive information on 133,000 drivers and pilots was stolen from a government vehicle last month. 

  • DHS puts Zitz in charge of cybersecurity division

    Career intelligence officer Robert S. Zitz has taken over day-to-day operations of the National Cyber Security Division, but the Department of Homeland Security still has numerous digital defense problems to remedy. 

  • Security Blog Log: Was the analyst a VA scapegoat?

    A scathing report on May's massive Veterans Affairs data theft causes some to ask who deserves the most blame: the analyst or his supervisors? 

  • Security Bytes: State Department probes computer break-ins

    Meanwhile, Adobe fixes security flaws in Acrobat and Reader while Juniper Networks fixes security flaws in its JUNOS program running on M-series, T-series, and J-Series routers. 

  • encryption

    Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.