DHS Secretary Janet Napolitano met with the Homeland Security Advisory Council’s (HSAC) Task Force on CyberSkills this week, where they discussed the latest developments in improving the agency’s cybersecurity initiatives.
The National Institute of Standards and Technology (NIST) announced the winner of its five-year competition to select a new cryptographic hash algorithm, one of the fundamental tools of modern information security.
When the subject of public cloud computing comes-up, it is inevitable that the concept of ‘risk’ soon follows. But the greatest risk to an organization considering public cloud is not security, it is cost.
Scaling a company or a critical application within can be as scary as it is exciting. IT stakeholders must be part of a proactively designed strategy that’s ready to be deployed at a moment’s notice. Luckily, you can get well on your way to keep performance and security intact while you scale, by ticking three boxes.
Along with the deployment of a robust security architecture is the need for a monitoring and response process that allows enterprises to continuously monitor and process security data efficiently and proactively act upon this data if something suspicious is found.
2012 was an interesting year in security – publicity around breaches led to greater awareness than we’ve seen in years, encouraging many in the Federal sector to look into our corner of IT. So what will happen in IT Security 2013?
Governments and organizations should make sure that technical and political implications are fully understood by all parties before blocking policies are developed. At the very least, any DNS blocking actions should be disclosed to all affected parties.
Many organizations looking at security for virtualized and cloud environments automatically assume that it is a choice between one or the other. The answer may vary based on your architecture, but there is a place for both.