Aimed to be voluntarily adopted by the nation's critical infrastructure operators, the cybersecurity framework will revolve around a core structure that includes five major cybersecurity functions: Know, Prevent, Detect, Respond and Recover.
More than one-quarter of the U.S. Senate is asking the national intelligence director to reveal more information to the public regarding the government's programs to collect massive amounts of data on communications of ordinary Americans.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.
The Office of the National Coordinator for Health IT, a unit of the Department of Health and Human Services, has offered Congress a glimpse at its security and privacy priorities for next year. Let us know what you think of the to-do list.
Most organizations rate their mobile device security efforts as poor, in need of improvement or just adequate, according to the latest ISMG survey. So where are the security gaps? Malcolm Harkins of Intel offers insights.