Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.
Summer is the best time for infosec professionals in institutions of higher education to focus on cybersecurity projects: baselining and inventorying, planning regular scans, and implementing new procedures.
Although penetration testing might be viewed as one of the more glamorous jobs in cybersecurity – think of Tom Cruise in Mission Impossible hacking into a CIA computer while dangling horizontally from cables in a heavily protected room – it might come as a surprise to learn that one of the challenges of the profession … Continue reading So You Want To Be A Penetration Tester
In cybersecurity as in national security, remembrance and eternal vigilance are essential to maintaining our freedom.
Vulnerability management is an essential part of government cybersecurity. It requires not only continuous monitoring and visibility to spot vulnerabilities, but also the context needed to prioritize vulnerabilities based on risk so agencies can take effective action to eliminate, patch or mitigate.
And as more people begin playing games and becoming familiar with the pillars of gaming, gamification projects will also pick up more players. Government agencies should make sure to stay on point with this trend. A good gamification project can enable them to tap into a hugely powerful problem-solving resource, all for the low cost of providing a little bit of fun for their players.
Shannon Felder, senior account executive with LEWIS Global Communications, recently interviewed Tech Writers Bureau’s Rutrell Yasin for her blog, covering issues such as technology and the government sector, cybersecurity, and how public relations professionals can be more effective working with folks in the media. Here’s an excerpt: You’ve been covering technology for more than 30 … Continue reading GETTING TO KNOW YOUR OTHER AUDIENCE: PART 2
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.
When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
IBM Security is giving its cloud-based cognitive technology Watson a new assignment: cybersecurity. The new Watson for Cyber Security is now in training at IBM to study the nuances of security research findings in order to more effectively discover patterns and hidden cyberattacks. IBM’s X-Force research library will be a central part of the materials … Continue reading IBM Watson Will Help Battle Cyberattacks