September 22nd at 11 AM Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure. This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.
Agencies and vendors soon will be able to submit cloud-based products and services to be certified and accredited once and be available for use by all of government. Version 2 of the FedRAMP security controls should be ready in the next few weeks. Cloud working group still must address several questions about the approval process.
Learn more about the Internet Policy Task Force
Has there been a break in the cloud? Symantec recently released its 2010 Break in the Clouds Report, which shows that many CIOs and CISOs in the federal government still have real concerns about security.…
Ari Schwartz is leaving the Center for Democracy and Technology after 13 years to join the National Institute of Standards and Technology as a senior Internet policy advisor. He explains the decision to become a fed.
This week, we bring you a special treat — an extended conversation with Mark White, a principal with Deloitte Consulting LLP who works with both the firm’s Federal and Technology practices. He is also the…
It\'s a saying many of us have grown to hate, but Apple\'s iPad really is being tested to see if it\'s \"good enough for government work.\"
Learn more in today\'s cybersecurity update.
Long-time privacy and cybersecurity expert to join the government to work on similar issues. EPA\'s Lisa Schlosser also takes on a new role at her agency.
August 12th, 2010 at 11 AM How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next \"Killer App\"?
With so much at stake, what role, if any does the federal government play in protecting the .com Internet domain? Several experts offer some candid observations on what the government\'s role should be.
Our Federal News Radio Discussion this month explores cybersecurity and the insider-threat with Jerry Davis of NASA, NIST\'s Elaine Newton, and Bobbie Stempfley from DHS.
A provision in the Commerce, Justice, State appropriations bill could give NIST a larger role in protecting federal and civilian computer networks. The plan is from one influential Maryland lawmaker, who believes the battle for cybersecurity needs to be fought in the Free State.