Officials have to consider the challenges and cost tradeoffs when dealing with how to secure their supply chain management.
Congress is asking for input as it overhauls the Federal Information Security Management Act of 2002.
There are other concerns that are, perhaps surprisingly, bigger barriers for intell agencies.
The agency's Active Authentication program would use behaviorial traits rather than passwords.
When we give up ownership of information and resources in favor of anywhere, any-device access, we risk trading down on security in the process.
As many agencies migrate services to public cloud environments, the Energy Department is holding back.
Ten years after it first passed, FISMA continues to frustrate agencies trying to comply with its requirements.
A fake profile for NATO's senior commander lured other officers into accepting a friend request, compromising personal information in the process.
New guidelines are part of an effort to improve consistency in handling classified information.
A collective defense used in the Atlantic during World War II holds lessons for an enterprise approach to cyber.
The telecom industry’s insistence that all regulation is bad for security does a disservice to those who rely on critical infrastructure.
DOD is expanding the use of the host-based security system to include training and enterprise technologies.