The Federal Information Security Amendments Act, sponsored by Rep. Darrell Issa, would establish a mechanism for stronger oversight through a focus on continuous monitoring of cyberthreats and conducting regular threat assessments.
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
Components manufactured overseas that go into IT products used by the U.S. government could be exploited by foreign intelligence agents to degrade the security of critical federal government networks and data, the GAO reports.
As one team of researchers analyzes a new version of Duqu, a worm related to the Stuxnet Trojan blamed for disabling Iranian centrifuges used to enrich uranium, other researchers zero in on who is behind the worm discovered last fall.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Jason Clark, CSO of Websense, has spent a significant amount of time meeting with over 400 CSOs. From his interactions, Clark offers his advice on how chief information security officers can be more effective.
Cloud security - everybody is talking about it, but what's actually being done? Becky Swain, founding member of the Cloud Security Alliance, discusses transparency, compliance and a new mobile initiative.
The rise in hacktivism and data breaches changed the information security landscape. These incidents also influenced the content of RSA Conference 2012, says Hugh Thompson, event program committee chair.