Remove category cio-role
article thumbnail

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings

fixing flaws) The four most important vulnerability categories listed by the study are SQL injection, cross-site scripting (XSS), cryptography issues and command injection. To improve on the current sad state of government cybersecurity , the Federal Information Security Management Reform Act (FISMA Reform) , has been proposed as a new bill.

Dell 70
article thumbnail

The Holistic IT Governance

Future of CIO

Begin with the CIO identifying every component of the cost associated with "keeping the lights on", then the currently approved projects by title, executive sponsor, budget, schedule, and resources dedicated to each project. Informally the resources can be bucketed under the run, grow, transform category at the broad organization level.