Brandon Gilmore

Government Tech Writer
October 18, 2017
3 Steps for Protecting PII in Government premium
From veterans to tax payers, contractors to military personnel, the U.S. government is one of the world’s largest harbors of personally identifiable information (PII). Year after year of security breaches has done nothing but destroy public trust in the government’s ability to protect PII about citizens, employees, and contractors. Protecting PII is a tricky business. […]
premium
Government Tech Writer
October 11, 2017
Threat Hunting and Your SIEM: 10 Reasons Why You Need Both premium
I bet there was a time you loved your security information and event management (SIEM) system. This central location for managing all the security events on your network. But, as good as it may seem, many IT organizations have a love/hate relationship with their SIEM. Less than 25% of security professionals are getting full value […]
premium
Government Tech Writer
September 11, 2017
What the Equifax Breach Means for Government Cybersecurity premium
As government officials begin investigation of the Equifax breach that exposed the sensitive information of 143 million people, what does the breach mean for agencies themselves? After all, the U.S. government stores far more sensitive data than the private sector, and often stores it on older, more vulnerable systems. This makes the government a top […]
premium
Government Tech Writer
September 5, 2017
How to Detect a Rogue Device the Instant It Connects to your Network premium
Hackers are ruthless in their persistence and fortitude. It can take weeks or months for them to gather intelligence on your IT vulnerabilities, penetrate your network, and exfiltrate your precious data. But they know, and statistics prove this, that, for the most part, their victims have no idea that their network infrastructure is under attack […]
premium
Government Tech Writer
August 22, 2017
[Webinar] Proven Tips to Help You Achieve Compliance with DFARS 7012 premium
Another month, another regulation deadline to comply with. But this time, it’s defense contractors who are in the hot seat. To safeguard defense information in non-federal systems and organizations, U.S. defense contractors and soon all federal agencies, must meet the DFARS 7012 mandate and implement all of the requirements of NIST Special Publication 800-171 Protecting […]
premium
Government Tech Writer
August 3, 2017
15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations premium
Securing government networks and systems takes a village. Keeping pace with attacks and shortage of security talent has driven security operations to pool data resources and orchestrate actions across vendors, open source projects, and internal development efforts. It’s a community effort. Sharing threat information and codifying procedures to better fend off the enemy with no […]
premium
Government Tech Writer
July 11, 2017
Time is Running out for Government Contractors to Meet Key Cybersecurity Compliance Deadline premium
Time is running out for federal contractors to comply with the Federal Controlled Unclassified Information (CUI) Program. What does the CUI Program mean to contractors? As of December 31, 2017, all federal contracts will require that businesses contracting with the federal government must comply with the Federal CUI rule (32 CFR Part 2002) which strives […]
premium
Government Tech Writer
June 28, 2017
Smart Cities are a Hacker’s Playground – Here’s What You Can Do premium
It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. But, is your agency ready for the billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? The risks of a breach or attack, particularly to vulnerable network […]
premium
Government Tech Writer
June 19, 2017
Protect Your Files With Encryption and Information Rights Management premium
After hearing Congressman Langevin and NSA speak at the ICIT Annual Forum event it became obvious that the “Enemy with No Face” is getting in to our networks and what they want is our data. FinalCode is purpose built to protect files with encryption and Information Rights Management (IRM), sometimes called Enterprise Digital Rights Management […]
premium
Government Tech Writer
May 25, 2017
Getting to Know the “Enemy with No Face” is Critical to Winning the Cyber War premium
“The enemy with no face”. No, it’s not the latest Dwayne “The Rock” Johnson Hollywood action movie, but the tagline from the U.S. Army’s latest cyber warrior recruitment ad. The nameless, faceless adversary proclaims he has the power to shut down our power grids, analyze our infrastructure, and access the personal data of everyone in […]
premium
Government Tech Writer