U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
"At the end of the day, we're going to have to spend money on (cybersecurity), real money on this, but we have to make sure that we're spending in a way that makes sense," Sen. Tom Carper says.
Auditors find that the SEC's IT office documented and incorporated National Institute of Standards and Technology patch requirements in its policies and procedures but that guidance wasn't always followed.
The co-chair of the Commission on Cybersecurity for the 44th President praises the Obama administration's commitment to IT security, but says the administration has much more work to do to develop a comprehensive strategy to combat cyber threats.
A team headed by Senior Computer Scientist Ron Ross will update one of NIST's premier risk management publications - SP 800-53: Recommended Security Controls for Federal Information Systems and Organizations.
The ruckus over a new cybersecurity bill's ban of a so-called Internet kill switch camouflages the real significance of the Cybersecurity and Internet Freedom Act. The bill, if enacted, would rejigger the way to govern federal IT security.
New Senate legislation would establish a White House Office of Cyberspace Policy with its Senate-confirmed director to have influence over agencies' IT security budgets.
Known as the Cloud First policy, Federal CIO Vivek Kundra has outlined a new policy in which one-quarter of the $80 billion the federal government spends on information technology would employ cloud computing solutions.
The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.
DHS's inspector general expresses a few reservations about the department's enterprise-wide security program and practices for its top secret/sensitive compartmented information intelligence system, but generally called the management of the system effective.
The General Services Administration needs to strengthen its IT security program in four key areas, the GSA inspector general says in its latest information security audit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.