Email Alerts
-
Steve Lipner on the Microsoft SDL, critical infrastructure protection
Microsoft’s senior director of security engineering says core SDL principles should be at the foundation of critical infrastructure system protection. News
-
Nothing funny about SCADA and ICS security
A researcher calls the state of industrial control system security “laughable” and warns of the consequences of unpatched critical infrastructure that is reachable over the Internet. News
-
Spear phishing attacks likely key in U.S. Chamber of Commerce breach, experts say
Spear phishing attacks via China were likely what led to the lengthy U.S. Chamber of Commerce breach, experts say. News
-
Draft report highlights U.S. government satellites under attack
Two U.S. government satellites came under attack four times in 2007 and 2008, according to a congressional commission. News
-
Continuous monitoring strategy for government security managers
A security expert offers insights and advice for government security managers on implementing a continuous monitoring strategy. Tip
-
NERC CSO Weatherford accepts DHS position
Mark Weatherford will focus on cybersecurity operations and communications resilience at the Department of Homeland Security. News
-
DHS cloud computing: Homeland Security’s model private cloud strategy
Using private cloud at separate data centers has allowed the Department of Homeland Security to strike a balance between security and cost savings. News
-
Inside the NSA trusted computing strategy
The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers. Video
-
Breach fears push federal cloud computing initiative to private cloud
Trapped between budget constraints and security fears, government agencies are increasingly opting for private clouds. News
-
Standardizing federal security regulations easier said than done
While Oregon officials have had success with a cross-government compliance program, standardizing federal requirements is another matter. News
Security Management Strategies for the CIO