Email Alerts
-
State IT security model for IRS compliance could work at federal level
Oregon's model for compliance with IRS information security requirements could be used for cross-agency security at the federal level. News
-
Identity Ecosystem should make life a little easier for IT shops
While implementation of the Identity Ecosystem is a long way off, the benefits for projects such as electronic health records could be significant. Tip
-
The Obama administration’s Identity Ecosystem plan: What to expect
President Obama's proposed Identity Ecosystem seeks to lock down personal credentials, but is it actually feasible? News
-
Data reduction software accelerates computer forensic investigations
Data reduction software is an essential part of any computer forensics process. Expert Richard W. Walker looks at data reduction software tools and processes and the role they play. News
-
Feds break up scareware crime rings
Twenty-two computers and servers n the U.S. were seized in connection with the scareware scheme. News
-
Gartner Security Summit attendees on IT security, government issues
When managing IT security, government infosec pros face unique risks. Check out these Q&As from the 2011 Gartner Security & Risk Management Summit. News
-
Gartner Security Summit attendees on IT security, government issues
When managing IT security, government infosec pros face unique risks. Check out these Q&As from the 2011 Gartner Security & Risk Management Summit. Video
-
Computer forensics growing part of Fed cybersecurity strategy
As the number of attacks on federal systems increases, more government agencies are realizing the importance of computer forensics. News
-
Data breach notification laws: Timing right for breach notification bill, experts say
The bill would supersede state laws and experts say they could help enterprises by setting one standard set of rules for breach notification. News
-
Government cybersecurity: User-level security tools mitigate Fed insider risks
Taking on a new zero-trust model, many federal agencies are implementing insider threat controls at the user level. Tip
Security Management Strategies for the CIO