Government IT Security Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Blog Log: Was the analyst a VA scapegoat?

    A scathing report on May's massive Veterans Affairs data theft causes some to ask who deserves the most blame: the analyst or his supervisors? 

  • Security Bytes: State Department probes computer break-ins

    Meanwhile, Adobe fixes security flaws in Acrobat and Reader while Juniper Networks fixes security flaws in its JUNOS program running on M-series, T-series, and J-Series routers. 

  • encryption

    Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. 

  • When access management becomes rocket science

    Security can be a hard sell beyond the IT realm, even for security pros at NASA. But nothing motivates people like regulatory pressure and a fear of being the next data breach headline. 

  • FISMA essentials for information security practitioners

    This tip provides an overview of the Federal Information Security Management Act (FISMA) and what information security professionals need to do in order to comply. 

  • Fighting the uphill battle against renegade apps

    Experts say keeping unsanctioned apps and technologies off company computers is a difficult battle to win. But protecting the network is possible. 

  • Personal data on 26.5 million veterans stolen

    The stolen information included names, Social Security numbers and dates of birth for the military veterans and some spouses. 

  • PING with Jane Scott Norris

    In an interview with Information Security magazine, Jane Scott Norris, Department of State's first CISO, offers some insight on what it takes to become a CISO. 

  • Making sense of the maze

    The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international b... 

  • Opinion: Investigating the FBI's 'invalid' security survey

    Should the FBI be in the security survey business? Columnist Ira Winkler says not only does the bureau's 2005 FBI Computer Crime Survey lack statistical validity, but also could create a false perception that security technology is ineffective.