John Burnham discusses INSA Study and Reality of Cyber-threats
Recently, I sat down with John Burnham to talk about the Cyber Security Study the Intelligence and National Security Alliance (INSA) released. The study contained analysis and recommendations for the...
View ArticleCan Security Intelligence “as a cloud” help the Federal Government face...
Last week I shared part one of John Burnham’s discussion of the INSA study released earlier this month. In this post, we continue the conversation and move onto the role of Security Intelligence as a...
View ArticleFISMA Cyberscope tool… keeping us safe with “occasional monitoring”
In an article from infosecurity-magazine.com called “Federal agencies reduce cybersecurity risk through continuous monitoring,” I was not surprised to hear that more agencies are shifting to continuous...
View ArticleCan intelligence sharing be a two-way street?
In a post published earlier this week, I invited you to read the latest article written by Chris Poulin for SecurityWeek. In this article, Chris presented his belief that full breach disclosure and...
View ArticleQ1 Labs named “Best Info Security Solution” by GTRA
Everyone likes recognition, especially when it comes directly from senior IT executives from across the federal government. Yesterday it was announced that the Government Technology Research Alliance...
View ArticleHelp – My Thermostat is Calling Home to China!
According to a recent report in the Wall Street Journal, a group of hackers in China broke into the U.S. Chamber of Commerce’s network around November 2009 and were not discovered until more than a...
View ArticleNotes from FOSE: Continuous Monitoring = Security Intelligence
Last week I participated in a panel on Continuous Monitoring at FOSE. Joining me were Mark Crouter from MITRE as the moderator, John “Rick” Walsh, chief of technology and business processes in the...
View ArticleWebinar Wrap-up: Continuous Monitoring and Real Time Risk Scoring
Government agencies, like their private sector brethren, are knee deep in IT security challenges, threats, and regulations. While that’s not much of a shock, this might be – according to the Government...
View ArticleAre You Drowning in Security Data?
Rich Mogull of Securosis recently wrote a blog entry called “Can You Stop a Targeted Attack?” that nicely complements a Dark Reading article and accompanying report by his colleague, Adrian Lane,...
View ArticleGTRA Roundtable Recap: How to Drive Efficiency and Improve Security
The CIA has The Farm, a secret facility somewhere in Virginia, where it trains agents in wiretapping, interrogation, and handling human “assets”. Similarly, the GTRA (Government Technology Research...
View Article
More Pages to Explore .....