Cloud technology can offer efficiencies and other savings, but it’s also susceptible to cost overruns and cyber threats. In this video interview, Garrett Lee with Broadcom explores both the opportunities that cloud computing offers and how to confront its security challenges.
Search Results for: Security
4 Ways to Make the Most of AI in Cybersecurity
Agencies are discovering that cybersecurity strategies that worked even a few weeks ago might be nearly obsolete today. One approach that is taking hold, however, is the use of AI. In a recent GovLoop online training, experts highlighted four ways that security teams can make the most of AI, including modernizing their identity-based security to integrate AI.Read… Read more »
Cloud Environment Security: An Approach
Securing cloud application environments can be challenging. This presents one approach that could be a foundation for your cloud security.
Why It’s Time to Take an Identity-First Approach to Security
In this video interview, Khizar Sultan of CyberArk, discusses how agencies can adopt an identity-first approach to cybersecurity.
Culture as a Risk Control: Embedding Trust and Security Into Team DNA
Your best firewall might be sitting two cubicles down. Here’s how to make cybersecurity everyone’s business.
The App Security Imperative: Closing the Cyber Gap
Application security is imperative in all phases of your agency’s software lifecycle, from design to deployment. That means you must continue to find new and better ways to embed security testing to reduce the risk of cyberattacks and protect your organization’s data. Recently, a rash of high-profile cyberattacks has exploited weaknesses in the elements usedRead… Read more »
From Siloed to Seamless: The Need for Integrated Security Monitoring
In this recent video interview, Paul Gomez of Security Information Systems discusses what modernized security monitoring entails and the benefits it offers.
The App Security Imperative: Closing the Cyber Gap
Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can leave gaps in cybersecurity. This video explains how to close those gaps by building, maintaining and continually validating software inventory, and incorporating testing throughout the development process to improve application security. Watch now: Brought toRead… Read more »
How to Build a Better Endpoint Security Strategy
In this video interview, Jared Vichengrad, of Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
Ensuring Cybersecurity When Cloud Isn’t an Option
Conventional wisdom holds that you can’t have effective cybersecurity without cloud connectivity. But for military users, emergency responders and critical-infrastructure operators, cloud isn’t always an option. In disconnected and low-bandwidth environments, a new approach is needed — one that does not depend on cloud connectivity. This report details how a modernized approach can leverage artificialRead… Read more »