In discussing Colorado's foray into cloud computing, Colorado Chief Information Security Officer Seth Kulakow discusses the demands the cloud presents governments and offers advice for IT security professionals on building their careers.
The Treasury Department blamed a cloud computing provider for the disruption of its website that provides the Internet face of the Bureau of Engraving and Printing, the agency that prints United States currency.
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
To start this week, I want to take a look at some of the numbers that caught my eye.
Trojans, ATM fraudster plea and home foreclosure rates are some of the stories that should mean something to everyone.
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing: Business Benefits With Security, Governance and Assurance...
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's new about federated ID management;