The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company...
Posts Tagged: Information assurance
When Defense Secretary Hagel announced that he was going to expand his cyber workforce by more than 6,000 by the end of 2016, I think most of us in the industry collectively wondered: “Where the heck is he going to FIND these cyber warriors?” While almost every University is paying attention to ...
Here is today’s federal cybersecurity and information technology news: Bruce Bennett, program executive officer of communications systems within the Defense Information Systems Agency, predicted that Department of Defense personnel may be able to use personal mobile device for unclassifie...
The Defense Intelligence Agency has awarded an $86 million task order to General Dynamics IT to furnish information assurance and cybersecurity services to the DIA’s installations in the United States and abroad,company officials said Oct. 14. Under the contract, General Dynamics IT will ensur...
At the Gartner ITxpo, Fixmo today unveiled Fixmo SafeZone, a powerful new solution to manage the risk associated with employees’ personal mobile devices on company networks. Fixmo SafeZone empowers the secure use of personal devices on a company network by creating a defense grade, encrypted...
The Department of Defense has given its stringent DOD Information Assurance Certification and Accreditation Process (DIACAP) security rating to a cloud service provider, Terremark, for two infrastructure-as-a-service locations. The rating hasn’t been given so far to Amazon Web Services or othe...
On 28 September 2011 a small number of cyber innovators, computer security practitioners and information assurance experts will gather in an attempt to map out new paths for positive change in the cyber security dynamic. This summit seeks dramatically enhance the state of security and functionality ...
via Armed with Science Information protection has evolved along with our information technology. Ciphers first protected written information. Ciphers then evolved into cryptography, which evolved into information security (INFOSEC). INFOSEC evolved even more when it fully incorporated computer secur...