Brandon Gilmore

Government Tech Writer
April 19, 2017
[Survey] Government Faces Credibility Test Over Cybersecurity Failings premium
Two years on from the massive Office of Personnel Management (OPM) data breach, current and former officials have concluded that the greatest fallout from the hack was not the loss of documents and personal identifiable information, but to the government’s reputation, reports NextGov. Speaking at a panel discussion hosted by the Intelligence National Security Alliance, […]
premium
Government Tech Writer
February 27, 2017
8 Principles for Securing DevOps premium
Although still in its infancy in the public sector, making the shift to DevOps methodologies is starting to catch on with many government agencies, including the U.S. Citizenship and Immigration Services, the EPA, and Nuclear Regulatory Commission. As you may know, with DevOps, IT tasks and application deployment that would normally take months or years, […]
premium
Government Tech Writer
February 6, 2017
Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements premium
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a […]
premium
Government Tech Writer
January 25, 2017
A Security Wish List for the New Administration Starts with Multi-Factor Authentication premium
Late last year, the government’s Commission on Enhancing National Cybersecurity published a detailed report, at President Obama’s request, to provide short- and long-term recommendations to strengthen cybersecurity in the public and private sector (you can read the full report on the NIST website). Essentially, the report contains a guiding set of principles for the next […]
premium
Government Tech Writer
January 12, 2017
Threat Hunting – Finding and Thwarting Mr. Robot premium
The concepts of threat hunting and threat intelligence went mainstream in 2016 bringing with it a whole new paradigm to threat mitigation and cybersecurity. But what is threat hunting and what use cases does it serve? As cyber-attacks become more sophisticated, today’s security teams need to adapt a more proactive role in detecting and responding […]
premium
Government Tech Writer
January 4, 2017
The Threat Landscape – 2016 in Review, and What’s Ahead for 2017 premium
Got breach fatigue yet? Yes, it’s been another bad year for computer security. 2016 saw the announcement of the biggest breach ever – the Myspace hack. But, that was quickly eclipsed by the September Yahoo data breach which resulted in the exfiltration of extensive account information, included passwords, from 500 million users. Not to be […]
premium
Government Tech Writer
December 21, 2016
Supercharge Your SIEM with Threat Hunting premium
Security Information Event Management (SIEM) tools have been around for quite some time. SIEMs are great for aggregating log files, parsing them, and using real-time correlation rules to spot security incidents. But more advanced incidents can evade detection by your SIEM. Finding those evasive threats becomes a lot easier if you employ threat hunting. Threat […]
premium
Government Tech Writer
October 21, 2016
Government File Sharing: 5 Steps to Reduce Data Leakage Risks premium
Data dissemination and file sharing between agencies and law enforcement authorities is a natural part of government business. But what happens when those files leave the security of domain-controlled network drives and content management systems? Unfortunately, the secure access and use of sensitive, even regulated data, within files that are shared internally and externally poses […]
premium
Government Tech Writer