This is Why 2018 Will Be the Year of Blockchain in Government

There’s been a lot of buzz about blockchain in 2017. It was only a few months ago in March 2017 that Betanews predicted that blockchain would be the buzzword that would take 2017 by storm. And it did, expanding beyond the financial community where it’s had a home for several years and breaking into other enterprise sectors.

But few foretold that blockchain would have such a hand in government digital transformation in 2017. In fact, the two go hand in hand.

What is Blockchain?

Are Your Endpoints a Risk? Take Control, Detect Risks, Automate Your Response

Getting to know the “enemy with no face” is critical to winning the cyber war. In fact, it’s the tagline from the U.S. Army’s latest cyber warrior recruitment ad. Yet, one of the biggest challenges to doing so is that most organizations have zero visibility into a significant percentage of the endpoints on their network. That’s because they are either not managed (BYOD, guest, and IoT), have disabled or broken agents, or aren’t detected by periodic scans.

NIST 800-63 For Unix/Linux Servers: Centrify vs. Password Vault Only Solutions

When it comes to controlling logins and privileges on Unix/Linux servers, Centrify’s philosophy is aligned with modern NIST recommendations, as opposed to traditional vendors whose solutions are centered around a Password Vault. Centrify believes users should login directly as themselves and elevate privileges granularly as needed and authorized.

How to Build a Government SOC on a Budget

Faced with an endless barrage of threats and vulnerabilities, finding the time to develop a proactive risk mitigation strategy is an uphill struggle for government organizations. With so much energy focused  on protecting the perimeter and preventing network penetration, malicious actors (the enemy with no face) already inside your network often goes unnoticed (case in point, the 2015 OPM breach).