How to Make Every Agency Employee a Security Advocate
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own.
Analysis: DHS Domain Name System Breach Directive
Video: Modernizing Data Protection in the Public Sector
Expert Panel: The Challenges and Opportunities for Modernizing Data Protection
As online data has become ubiquitous, managing that data has become as important an endeavor as amassing and storing it. A host of issues surround data management, not the least of which is security. But many others loom as data increases exponentially both in size and in importance.
BYOx for the Most Secure Spaces
Article written by Jim Hansen, VP of Products, Security, SolarWinds
Earlier this year, the Department of Defense (DoD) released a policy memo stating that DoD personnel—as well as contractors and visitors to DoD facilities—may no longer carry mobile devices in areas specifically designated for “processing, handling, or discussion of classified information.”
White House Cybersecurity Strategy: The Essence
The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity. Let’s look its four “pillars”, and their key elements.
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator:
Cyber Hygiene: Five Ways to Make Your Bed
“Cyber Hygiene”: you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security. Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and so on.
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
How Can You Protect the Mid-Terms and Secure Election Networks in Minutes?
With the mid-term elections looming, protecting the integrity of our most basic democratic right has become a matter of critical importance. According to the Electronic Frontier Foundation, a nonprofit organization dedicated to defending civil liberties in a digital world, election security remains just as vulnerable as in 2016 and encourages Secretaries of State to be pressed to do their job and increase security before voters cast their ballo