Blog Posts Tagged with "Contractors"

7fef78c47060974e0b8392e305f0daf0

Howard Schmidt on Partnership Developments in Cybersecurity

May 23, 2012 Added by:Infosec Island Admin

Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The US Cyber Guard Begins

May 17, 2012 Added by:Joel Harding

US cyber defenses will now include more than just the US Cyber Command and the Department of Homeland Security. Eventually it may include somewhere around 8,000 contractors, mostly defense contractors. Of course the conspiracy theorists will begin screaming “big brother”...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Defense Industrial Base Cyber Security Program

May 14, 2012 Added by:Infosec Island Admin

The United States continues to face a significant risk that critical Defense information networks can be compromised by malicious actors resulting in economic losses or damage to national security. The DIB CS/IA Program is designed to improve DIB network defenses...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ten Ways to Handle Insider Threats

April 18, 2012 Added by:Brent Huston

Tough economic times make it tempting for an employee to switch his white hat to a black one for financial gain. Insider threats also include contractors, auditors, and anyone who has authorized access to systems. How can you minimize the risk? Here are a few tips...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

GSA Final Rule Requires Vendor Proof of Security

January 10, 2012 Added by:Headlines

The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...

Comments  (1)

959779642e6e758563e80b5d83150a9f

How to Make Federal Data Security Effective

April 06, 2011 Added by:Danny Lieberman

In order to improve IT security countermeasure effectiveness in the Federal Government, the OMB should reduce base payments to contractors who provide IT security services and link their compensation to a reduction in the damage caused to government data and network assets...

Comments  (0)