Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Information security

Know Thyself to Defeat Cyber Intruders

September 18, 2014
By Robert K. Ackerman

Organizations cannot hope to counter cyber intruders if they don't fully understand their own network and why they are targeted.

Information Security Scholarships Available

November 21 ,2012
By Maryann Lawlor

The (ISC)2 Foundation’s information security 2013 scholarship program application process will open on January 1, 2013, offering a total of $120,000 in awards to women, graduate students, young professionals and faculty.

 

Information Leaks Can Sink Agencies

December 2, 2011
By Prenston Gale

Thousands of data breaches occur as a result of internal information leakage rather than an outside attack. There is a critical need to further educate government personnel on how to keep sensitive information secure. Guest blogger Prenston Gale weighs in with insight on how to achieve this important goal.

TRICARE Deals With Data Breach

November 14, 2011

The Pentagon's TRICARE office is offering assistance to nearly 5 million people who may have been affected by a recent data breach contractor Science Applications International Corp. (SAIC) reported.

Information Security Innovation Recognized

October 20, 2011

(ISC)², the not-for-profit information security professional body that administers the Certified Information Systems Security Professional certification, announced this week the winners of its eighth annual U.S. Government Information Security Leadership Awards.

Managing Cyberthreats in a Standard Fashion

August 2011
By Rita Boland, SIGNAL Magazine

The cybercommunity has a new resource at its disposal to identify and mitigate issues across networks and systems. This standardization tool can make reporting problems more uniform, which should result in faster response times. Developers designed an open format that will be machine- and human-readable to automate processes, marking a divergence from standards presented in the past.

Global and Domestic Focus on Cybersecurity Sharpened

August 2011
By Max Cacas, SIGNAL Magazine

From the White House, to the Defense Department, and from corporate boardrooms to computer rooms across the country, the issue of protecting the networks of government and industry is increasingly leading to the development of new strategies and plans.

NATO Set to Strengthen Cybersecurity

August 2011
By George I. Seffers, SIGNAL Magazine

NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.

NATO Set to Strengthen Cybersecurity

August 2011
By George I. Seffers, SIGNAL Magazine

NATO is reinforcing cybersecurity for its entire communications and information systems architecture and on all of its networks, including unclassified, restricted and secret networks. The project will be implemented in several phases and is speeding toward completion by the end of 2012, a challenging deadline that NATO officials say they are determined to meet.

Information Security Organization Extends International Reach

December 1, 2010
By Henry Kenyon

(ISC)2 has created an application security advisory board that includes information professionals from the Asia-Pacific region, Europe and the Americas. The board will recommend ways to increase awareness of software that is not secure and help software developers understand how to introduce security directly at the software development level.

Pages

Subscribe to RSS - Information security