Where does the information security budget reside and who owns it? That's an ongoing debate as organizations allocate resources to protect critical assets in a dynamically changing technology and threat environment.
In many organizations, chief information security officers report to the chief information…
This week in John Breeden’s NextGov column, he writes about an unlikely NASA presentation that happened at a riotous sci-fi party in Reykjavik, Iceland. It turns out that all those worries about asteroids hitting Earth and killing everyone should soon be a…
Enterprise security will never be perfect, but this NSA lifecycle can help you understand your adversary and respond with the appropriate mitigations.
The IRS is preparing for a digital future as if the Real World had already disappeared. It’s no surprise that the agency’s taxpayer service has gone to hell. IRS managers and their congressional overseers have to acknowledge that the Internet is not…
Lack of communication between IT departments and those responsible for executing agency mission can lead to the creation of shadow IT—unauthorized and often unmanaged applications that can introduce vulnerabilities. This is something that SecurityCenter Continuous View™ (CV) can help you identify, understand…
NIST has published recommendations for using crypto algorithms such as AES for format-preserving encryption (FPE), which can be a big help in protecting personal financial and health data.
In John Breeden’s latest NextGov column, he examines the impressive win that pitted an artificial intelligence program called AlphaGo against the top player of the ancient Chineese game of Go. And AlphaGo swept the series, beating Lee Se-dol three to zero in…
Cybersecurity salaries continue to rise as organizations grapple with an increasing shortage of cyber talent. Given the current climate, job-hopping might seem like a way to earn more money in the short term.
However, developing the necessary skills that are in demand…
Some days start out quiet—too quiet—for a cybersecurity analyst. Others, not so much.
“We never know what is going to happen. A day can start out calm or start out on fire and very quickly go from one or another,” says Jim Treinen,…
A new Common Criteria protection profile for peripheral sharing switches boosts the security of desktop components where classified and unclassified networks converge.
