Are Your Endpoints a Risk? Take Control, Detect Risks, Automate Your Response

Getting to know the “enemy with no face” is critical to winning the cyber war. In fact, it’s the tagline from the U.S. Army’s latest cyber warrior recruitment ad. Yet, one of the biggest challenges to doing so is that most organizations have zero visibility into a significant percentage of the endpoints on their network. That’s because they are either not managed (BYOD, guest, and IoT), have disabled or broken agents, or aren’t detected by periodic scans.

The 4 Biggest Government Cybersecurity Threats of 2014 (and How to Stop Them)

While we’ve been busy fretting about Ebola and the Islamic State, in 2014 cybersecurity trumped terrorism as the number one threat to the U.S.

Despite investing billions in cybersecurity, federal, state and local agencies are struggling to keep pace with ever-evolving threats.

Let’s take a look at the biggest cybersecurity threats of 2014 (so far) and steps the federal as well as state and local government can take to stop them.

The Government Workforce

Technically News - 7/18

This week in Technically News: Three Types of Cybersecurity Threats (and two employees) to Worry About Most; Survey Suggests Federal Network Complexity is Limiting Data Center Consolidation; Feds Pursue Cloud Forensics Standards; U.S. Army Grants Certificate of Networthiness (CoN) for 21 SolarWinds IT Management Products

Technically News – 6/27

This week in our government IT news round-up: Successful Software Projects Are No Accident; Symantec Launches Cybersecurity Program to Bridge Workforce Gap; CIA Information Chief Talks Cloud Computing, Culture Clash at Amazon Event; 5 Tips for Building BYOD Programs for Local Government; Chris LaPoint on Info Security and Automation in Government IT

Technically News – 4/25

This week in Technically News: Red Hat Touts Virtual Containers as Next Advance in Cloud Computing; In The Wake of Heartbleed, Open Source Software is Under Scrutiny; The Future of Mobility Goes Far Beyond BYOD; Severe Shortage of Tech Talent in Government, Says Report; DLT Solutions Announces CODEvolved

Technically News - 1/20

This week in Technically News: Top 10 Influencers in Government InfoSec; Why Cyber Security Is Not Enough: You Need Cyber Resilience; Dell Software Addresses Agency Needs in BYOD, Big Data and Security; Fixing Government Tech: Innovation Against IT Cartels and Complex Systems; Secret to BYOD: Make Security an Enabler.

The Internet of Hackable Things

The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.

Technically News - 9/16

This week in Technically News: Symantec to Start Revoking Customer’s SSL Certificates by October 1; Oracle Launches Cloud Services Built for Government Agencies; Red Hat CIO Takes an Open-Source Approach to Security & BYOD; Are Federal IT Initiatives Strangling Agency Networks; 13 Cloud Computing Stats for CIOs; Cybersecurity Legislation: What’s Next.

Technically News - 9/2

This week in Technically News: Army Admits To Major Computer Security Flaw; Secure Data, Not Devices; NIST Issues Preliminary Cybersecurity Draft Framework; Red Hat Unveils New Offerings, Cloud Certification at VMworld; Investment Capital Floods Cybersecurity Market.