If you think that quantum computers are the stuff of science fiction, you might be surprised to learn that there are several powerful ones operating right now, and if they realize their full potential, current government encryption levels might not be enough.…
Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.
Summer is the best time for infosec professionals in institutions of higher education to focus on cybersecurity projects: baselining and inventorying, planning regular scans, and implementing new procedures.
Although penetration testing might be viewed as one of the more glamorous jobs in cybersecurity – think of Tom Cruise in Mission Impossible hacking into a CIA computer while dangling horizontally from cables in a heavily protected room – it might come…
In cybersecurity as in national security, remembrance and eternal vigilance are essential to maintaining our freedom.
Vulnerability management is an essential part of government cybersecurity. It requires not only continuous monitoring and visibility to spot vulnerabilities, but also the context needed to prioritize vulnerabilities based on risk so agencies can take effective action to eliminate, patch or mitigate.
And as more people begin playing games and becoming familiar with the pillars of gaming, gamification projects will also pick up more players. Government agencies should make sure to stay on point with this trend. A good gamification project can enable them…
Shannon Felder, senior account executive with LEWIS Global Communications, recently interviewed Tech Writers Bureau's Rutrell Yasin for her blog, covering issues such as technology and the government sector, cybersecurity, and how public relations professionals can be more effective working with folks in…
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.
When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
