New & Notable
Government information security management News
December 13, 2018
This week's Risk & Repeat podcast looks at the recently disclosed cyberattack on the National Republican Congressional Committee and the questions that remain about it.
November 16, 2018
News roundup: Three years after the OPM data breach, the agency still hasn't implemented basic security. Plus, seven new Meltdown, Spectre attacks were uncovered, and more.
November 08, 2018
The Cyber National Mission Force will share unclassified U.S. Cyber Command malware samples to VirusTotal and one expert hopes there will be more action taken to help researchers.
October 23, 2018
Malicious actors attacked a back-end insurance system and the resulting Healthcare.gov breach exposed an unknown amount of data on 75,000 people.
Government information security management Get Started
Bring yourself up to speed with our introductory content
The NIST incident response plan involves four phases enterprises can take to improve security incident handling. Expert Mike O. Villegas reviews each step. Continue Reading
The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the Department of Defense. Continue Reading
Prospects of GDPR enforcement may be sowing fear, uncertainty and doubt. But the policy is also sending a clear message to companies: protect customer privacy, or else. Continue Reading
Evaluate Government information security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
For Xerox CISO and former White House deputy CIO Alissa Johnson, cybersecurity lessons learned in the public sector are proving relevant in her current role. Continue Reading
Tensions between the U.S. and Russia have led to source code reviews on security products, but the process isn't new. Expert Michael Cobb explains what to know about these reviews. Continue Reading
The IoT Cybersecurity Improvement Act sets a minimum security bar for selling IoT products to the federal government by eliminating default passwords and known vulnerabilities. Continue Reading
Manage Government information security management
Learn to apply best practices and optimize your operations.
When considering a local government cybersecurity program, companies must understand the dangers of not having one. Matt Pascucci explains why a program designed to monitor the public sector is crucial. Continue Reading
NIST published 'Criticality Analysis Process Model: Prioritizing Systems and Components' to guide organizations when prioritizing systems. Discover the key processes with Judith Myerson. Continue Reading
The EU's General Data Protection Regulation legislation goes into effect in May 2018. Don't assume your European business is too insignificant to need to comply. Continue Reading
Problem Solve Government information security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
There's no evidence that threat actors have been able to manipulate or change vote counts in our elections, but Kevin McDonald says that doesn't mean it can't -- or won't -- happen. Continue Reading
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss Pentagon cybersecurity amid reports of misconfigured servers at the U.S. Department of Defense. Continue Reading