Brandon Gilmore

Government Tech Writer
August 3, 2017
15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations premium
Securing government networks and systems takes a village. Keeping pace with attacks and shortage of security talent has driven security operations to pool data resources and orchestrate actions across vendors, open source projects, and internal development efforts. It’s a community effort. Sharing threat information and codifying procedures to better fend off the enemy with no […]
premium
Government Tech Writer
July 11, 2017
Time is Running out for Government Contractors to Meet Key Cybersecurity Compliance Deadline premium
Time is running out for federal contractors to comply with the Federal Controlled Unclassified Information (CUI) Program. What does the CUI Program mean to contractors? As of December 31, 2017, all federal contracts will require that businesses contracting with the federal government must comply with the Federal CUI rule (32 CFR Part 2002) which strives […]
premium
Government Tech Writer
June 28, 2017
Smart Cities are a Hacker’s Playground – Here’s What You Can Do premium
It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. But, is your agency ready for the billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? The risks of a breach or attack, particularly to vulnerable network […]
premium
Government Tech Writer
June 19, 2017
Protect Your Files With Encryption and Information Rights Management premium
After hearing Congressman Langevin and NSA speak at the ICIT Annual Forum event it became obvious that the “Enemy with No Face” is getting in to our networks and what they want is our data. FinalCode is purpose built to protect files with encryption and Information Rights Management (IRM), sometimes called Enterprise Digital Rights Management […]
premium
Government Tech Writer
May 25, 2017
Getting to Know the “Enemy with No Face” is Critical to Winning the Cyber War premium
“The enemy with no face”. No, it’s not the latest Dwayne “The Rock” Johnson Hollywood action movie, but the tagline from the U.S. Army’s latest cyber warrior recruitment ad. The nameless, faceless adversary proclaims he has the power to shut down our power grids, analyze our infrastructure, and access the personal data of everyone in […]
premium
Government Tech Writer
April 19, 2017
[Survey] Government Faces Credibility Test Over Cybersecurity Failings premium
Two years on from the massive Office of Personnel Management (OPM) data breach, current and former officials have concluded that the greatest fallout from the hack was not the loss of documents and personal identifiable information, but to the government’s reputation, reports NextGov. Speaking at a panel discussion hosted by the Intelligence National Security Alliance, […]
premium
Government Tech Writer
February 27, 2017
8 Principles for Securing DevOps premium
Although still in its infancy in the public sector, making the shift to DevOps methodologies is starting to catch on with many government agencies, including the U.S. Citizenship and Immigration Services, the EPA, and Nuclear Regulatory Commission. As you may know, with DevOps, IT tasks and application deployment that would normally take months or years, […]
premium
Government Tech Writer
February 6, 2017
Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements premium
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a […]
premium
Government Tech Writer
January 25, 2017
A Security Wish List for the New Administration Starts with Multi-Factor Authentication premium
Late last year, the government’s Commission on Enhancing National Cybersecurity published a detailed report, at President Obama’s request, to provide short- and long-term recommendations to strengthen cybersecurity in the public and private sector (you can read the full report on the NIST website). Essentially, the report contains a guiding set of principles for the next […]
premium
Government Tech Writer