The NIST cybersecurity framework is here: Now what?

Government IT Security Management

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • When access management becomes rocket science

    Security can be a hard sell beyond the IT realm, even for security pros at NASA. But nothing motivates people like regulatory pressure and a fear of being the next data breach headline. 

  • FISMA essentials for information security practitioners

    This tip provides an overview of the Federal Information Security Management Act (FISMA) and what information security professionals need to do in order to comply. 

  • Fighting the uphill battle against renegade apps

    Experts say keeping unsanctioned apps and technologies off company computers is a difficult battle to win. But protecting the network is possible. 

  • Personal data on 26.5 million veterans stolen

    The stolen information included names, Social Security numbers and dates of birth for the military veterans and some spouses. 

  • PING with Jane Scott Norris

    In an interview with Information Security magazine, Jane Scott Norris, Department of State's first CISO, offers some insight on what it takes to become a CISO. 

  • Making sense of the maze

    The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international b... 

  • Opinion: Investigating the FBI's 'invalid' security survey

    Should the FBI be in the security survey business? Columnist Ira Winkler says not only does the bureau's 2005 FBI Computer Crime Survey lack statistical validity, but also could create a false perception that security technology is ineffective. 

  • CSOs seek regulatory sanity in 2006

    IT security officers long for a common system to comply with laws that are similar, but often have conflicting demands. Some say a single set of federal guidelines could help, but others fear the implications. 

  • Separating fact from fiction: Security technologies for regulatory compliance

    This presentation by Burton Group analyst Diana Kelley explores what companies need to think about when creating policies for compliance. 

  • The 5 pillars of successful compliance

    Find out how to put the key benefits of what Pamela Fusco achieved at Merck & Co. to work in your own organization as she covers five key areas associated with security's role in compliance.