Learn more from a GAO report on the efforts to harmonize information security policies
Information Security reports that a security expert says the Air Force ban of thumb drives will not solve the problem of how to prevent classified leaks, such as in the WikiLeaks incident.
The commissioner of the Internal Revenue Service offered a public apology Thursday to taxpayers who have had their names and social security numbers used to claim fraudulent refunds. The IRS is working to strengthen its internal controls to prevent it from issuing such refunds in the future.
Cybersecurity budgets may be shrinking like other budgets, Government Computer News reports. That means many chief information security officers may have to develop strategies for limited or reduced funding. (ISC)2 compiled 8 ideas for CISOs…
Are you a federal manager? Then you need these 13 tips for managing the new crop of teleworkers in your office.
Rick Kerestesy and Doug Berry from the Ambit Group discuss how federal CIO’s can effectively enact and manage change. March 22, 2013
The Veterans Affairs Department denies claims that systems or data are in danger. But Jerry Davis, the former deputy assistant secretary for information security in VA’s Office of Information and Technology, asserts in documents that he was bullied into signing security certifications that were deficient as a condition of his departure from VA for a new job at NASA.
Documents obtained by Federal News Radio show VA’s financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.
Congressional report points to misuse of TSA’s “sensitive security information” designation for unclassified agency data.
Tyler Morris and April Chen, with Iron Mountain Government Services, join host John Gilroy to discuss a recent survey that looks at the records management challenges facing federal IT officials. June 17