information security

  • GAO: securing information can be simplified

    Learn more from a GAO report on the efforts to harmonize information security policies

  • Air Force ban of thumb drives is temporary WikiLeaks solution

    Information Security reports that a security expert says the Air Force ban of thumb drives will not solve the problem of how to prevent classified leaks, such as in the WikiLeaks incident.

  • IRS head apologizes to ID theft victims

    The commissioner of the Internal Revenue Service offered a public apology Thursday to taxpayers who have had their names and social security numbers used to claim fraudulent refunds. The IRS is working to strengthen its internal controls to prevent it from issuing such refunds in the future.

  • CISOs will likely face tighter IT security budgets

    Cybersecurity budgets may be shrinking like other budgets, Government Computer News reports. That means many chief information security officers may have to develop strategies for limited or reduced funding. (ISC)2 compiled 8 ideas for CISOs…

  • Top tips for managing teleworkers

    Are you a federal manager? Then you need these 13 tips for managing the new crop of teleworkers in your office.

  • Managing change at your agency

    Rick Kerestesy and Doug Berry from the Ambit Group discuss how federal CIO’s can effectively enact and manage change. March 22, 2013

  • VA’s security shortcuts put millions of veterans’ data at risk, former VA cyber official alleges

    The Veterans Affairs Department denies claims that systems or data are in danger. But Jerry Davis, the former deputy assistant secretary for information security in VA’s Office of Information and Technology, asserts in documents that he was bullied into signing security certifications that were deficient as a condition of his departure from VA for a new job at NASA.

  • VA cyber saga continues as audit shows continued holes in network security

    Documents obtained by Federal News Radio show VA’s financial audit found material weaknesses, including the failure to remove terminated employees from accessing the network, and the lack of a formal process for monitoring, preventing installation and removing unauthorized application software on agency systems. House Veterans Affairs lawmakers continue to press VA to make changes to their cybersecurity posture more quickly. VA officials say they have a multi-layered defense to include outside network monitoring by external partners, active scanning of Web applications and source code, and protection of servers, workstations, network and gateways, among other security efforts.

  • Despite Obama directive, agencies maintain ad-hoc approach to unclassified information

    Congressional report points to misuse of TSA’s “sensitive security information” designation for unclassified agency data.

  • The keys to effective records management

    Tyler Morris and April Chen, with Iron Mountain Government Services, join host John Gilroy to discuss a recent survey that looks at the records management challenges facing federal IT officials. June 17