-
Friday, January 27, 2012
Cybersecurity Transformation and Information Sharing at the Department of Energy
Cybersecurity is a critical enabler of the Department of Energy’s (DOE) diverse mission and essential for protecting our cyber networks, computers and mobile devices.
Learn More › -
Thursday, October 6, 2011
The “Business” of Cybersecurity!
October marks our 8th Annual Cybersecurity Awareness Month at Department of Transportation (DOT). The theme of our overall awareness campaign is “Cybersecurity is Our Responsibility”. Each consecutive week will focus on a specific theme including remote access, mobile devices, data protection, PIV card provisioning and education and training for IT security professionals.
Learn More › -
Thursday, September 8, 2011
Commerce Emphasizing Innovation and Efficiency in IT Security Operations
You missed it! The Department of Commerce's Office of the Chief Information Officer (OCIO) hosted its inaugural Innovating Security Conference to increase knowledge and awareness of various initiatives, exchange information and ideas, and engage in discussions on ways to further protect and strengthen the security posture of the department’s information systems.
Learn More › -
Wednesday, May 4, 2011
Why IT Efficiencies?
Why is the Department of the Navy aggressively pursuing information technology efficiencies? There are a number of contributing factors that led to the recent focus on efficiencies, but the primary catalyst is the realization by Department of Defense and DON leadership that from a fiscal perspective we cannot...
Learn More › -
Wednesday, November 17, 2010
FedRAMP: Governmentwide Approach to Cloud Security
If you've read my blog for a while, you know I have I have been a big proponent of cloud computing for some time. Cloud computing enables faster, greener, and more cost effective service to our stakeholders. However, that doesn’t mean there aren’t issues around cloud computing that still need to be resolved.
Learn More › -
Friday, July 2, 2010
Social Media Presence at NRC
I was recently asked about the Nuclear Regulatory Commission's (NRC) use of social media tools. The two questions I got had to do with why NRC doesn't yet have an "official" presence.
Learn More › -
Saturday, June 5, 2010
Our Insecurities or: How to Stop Worrying and Love Compromised Cyber Environments
My Deputy CIO for IT Security, Jerry Davis recently asked if I thought he was paranoid. I assured him that he wasn’t really paranoid if we really are operating in a compromised environment.
Learn More › -
Wednesday, April 21, 2010
Faster, Smarter Cybersecurity
Cyber-crime on the rise with 100 attacks a second worldwide. With headlines like these, just in the past couple of days, it is little wonder why the Obama Administration is taking the threat of cyber attack so seriously. Without question, the threat is real, and our response must match it in intensity, security, and creativity.
Learn More › -
Monday, September 28, 2009
Moving Beyond Compliance: The Status Quo Is No Longer Acceptable
The threats to our nations information security continue to evolve and therefore our approach to cybersecurity must confront these new realities. In order to meet the evolving challenges we now face, Federal Information Security Management Act (FISMA) metrics need to be rationalized to focus on outcomes over compliance. Doing so will enable new and actionable insight into agencies' information and network security postures, possible vulnerabilities and the ability to better protect our federal systems.
Learn More ›
POPULAR TAGS
access to data
accountability
best practices
citizen engagement
cloud computing
cybersecurity
improved service delivery
open government
transparency
waste reduction
View All Tags ›
ARCHIVES
September 2012 | ||||||
---|---|---|---|---|---|---|
26 | 27 | 28 | 29 | 30 | 31 | 1 |
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 | 1 | 2 | 3 | 4 | 5 | 6 |