This is the last in a series of profiles featuring 2012 U.S. Government Information Security Leadership Award (GISLA) winners. The winners received the awards in October from (ISC)2 a nonprofit serving certified information security professionals and administrators.

As the systems that support space missions continue to grow in scale and complexity, so does the need to keep improving the processes used to assess system vulnerabilities. At the same time, those processes have to remain flexible, reliable and still meet a host of complex continuous monitoring guidelines. Keep reading →

Washington area Metro riders may be wondering who changed the names of all of their metro stops. If they work in federal IT, that’s just the reaction executives at electronics giant, Intel, are hoping for.

Intel created an altered version of Washington’s Metro subway map as part of a new advertising campaign in Washington that is catching attention with the region’s riders on the way to work. Keep reading →

What you don’t know about your mobile technology can harm you–and your organization–warned a long-time federal intelligence executive now helping the U.S. Army’s leading logistics provider.

That was the impetus behind a new seven minute video developed for the 70,000 employees of the Army Materiel Command, but which offers a primer for virtually anyone using a mobile smart phone or laptop for work. Keep reading →

As the Army eyes handing out smart phones to every soldier, one stark fact stands out: Android phones are much more susceptible to malware attacks than are iPhones.

And the number of malware attacks on Android phones is increasing rapidly, with the computer security firm McAfee saying in its quarterly security report that, “Android-specific malware moved to number one” position of mobile systems attacked.

When it comes to cybersecurity and assurance measures designed to protect sensitive digital assets few people would argue that the risks of attack and compromise has increased sharply over the past few years.

For example, computer security giant McAfee released their 2010 Q3 Threats Report and in it they reported that on average 60,000 new malware threats were identified each day. In their 2011 Q1 Threat Report 6 million unique pieces of malware were recorded. This was the most active quarter in malware history. These figures clearly indicate the severity of the current cyber threat. Keep reading →