Follow Slashdot stories on Twitter


Forgot your password?
Government Security IT Your Rights Online

State Department CIO Interviewed About Post-Wikileaks Changes 24

CowboyRobot writes, quoting Information Week: "Eighteen months after its diplomatic cables were exposed in the WikiLeaks breach, the State Department continues to lock down its confidential information, while increasing its use of using social media. The agency is deploying new security technology, including auditing and monitoring tools that detect anomalous activity on the State Department's classified networks and systems. State has also begun tagging information with metadata to enable role-based access to those who need it, and is planning to implement public key infrastructure on its classified systems by the summer of 2014. This is all taking place despite the recent announcement that the IT budget will be cut by nearly 5%."
This discussion has been archived. No new comments can be posted.

State Department CIO Interviewed About Post-Wikileaks Changes

Comments Filter:
  • by dakohli ( 1442929 ) on Friday April 06, 2012 @09:22AM (#39596553)

    You have hit the nail on the head

    Many security breaches can be prevented if we just follow the guidelines that are in place. If you look at the case of Sub-Lieutenant Jeffrey Delisle [] there were some indicators [] such as his divorce and bankruptcy which are red flags.

    In Delisle's case he was caught, but it is not clear how much info he sold.

    Yet a third case of Security Officials dropping the ball is John Walker [] who I believe was turned in by his wife. This guy at one point didn't even try to keep his clearance updated!

    So, in the end it falls to the procedures we have in place. If we don't consistently follow them, we pay the consequences.

"The eleventh commandment was `Thou Shalt Compute' or `Thou Shalt Not Compute' -- I forget which." -- Epigrams in Programming, ACM SIGPLAN Sept. 1982