Cybersecurity Coordinator Howard Schmidt recognizes the need to battle online piracy to protect U.S. intellectual property but contends legislation before Congress to do just that would unacceptably curtail Internet freedom and increase cybersecurity risks.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
Pace University's Seidenberg Cyber Security Institute plans to leverage public-private partnerships - a challenge for educational institutions. How will the institute help the private and public sectors meet their security needs?
Notifying patients about a healthcare information breach requires a "difficult balancing act" by entities to ensure that risks are not exaggerated, says attorney Robert Belfort, an expert in HIPAA compliance, fraud and abuse.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
Funding would be through NIST's Small Business Innovation Research program that fuels technological innovation by strengthening the role small business plays in bringing to market innovations derived from federal R&D.
Given the plethora of guidance available, individual operators of the nation's critical infrastructure may be challenged in identifying the guidance that is most effective in improving their security posture, GAO's Gregory Wilshusen says.
With the spotlight on federal budget cutting, two Republican senators are pressing the acting head of the Medicare and Medicaid programs to start outlining her anti-fraud efforts aimed at eliminating waste.