Recent reports on counterfeit electronics and IT products show increases in the number of incidents and inadequate policies to deal with the problem.
The Security Content Automation Protocol automates much of the job of checking and validating security settings on IT systems, and NIST has developed recommendations for making the best use of it.
CIO Magazine finds 7 lessons from outsourcing failures around the country.
Old mainframe computers stay at a company longer than the employees who know how to run them, according to a news report.
Microsoft has adopted a variant of its "responsible disclosure" policy for reporting security flaws in its software, the company announced last week.
A council of global IT CIOs, in conjunction with research group Gartner Inc., has released a "code of conduct" for solution vendors on IT maintenance issues.
True believers see it as the future. Detractors call for caution. But what do they both agree on?
The problem with government IT security is not so much a lack of adequate regulations but a lack of resources to ensure that agencies practice good security, says former Interior CIO Hord Tipton.
The Obama administration announced today that it will overhaul the federal financial management system and prohibit agencies from placing task orders or contracts for modernization efforts.
A survey of IT managers and recruiters by the Dice Report finds that 71 percent expect to hire more staff members in the second half of the year than they did in the first, and 30 percent said salaries for new hires are on the rise.
Guidance for IT spending the fiscal 2012 budget emphasizes accountability, performance and security, federal CIO Vivek Kundra tells a Washington audience.
NIST is revising its guidance for assessing the IT security controls required under FISMA as part of an effort to emphasize real-time risk management and to harmonize security requirements across government.