Posts By Hannah Moss

Paid Parental Leave: Gov vs. Private Sector

Is it better for women in the private sector? That was the question posed by a young govie to GovLoop’s CEO Steve Ressler at a recent event. It’s a simple question, but unfortunately the answer is not so straightforward. First, comparing the private sector to the entire public sector is like comparing 12 kinds ofRead… Read more »

Assuming a Platform Approach to Cybersecurity

This interview with Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Attackers use a multitude of tactics and applications to penetrate networks today – from sophisticated techniquesRead… Read more »

An Update on the Data Act

The Digital Accountability and Transparency Act, or simply the DATA Act, is tranforming the way federal spending is reported, managed and disclosed. Are you ready? Once signed byPresident Obama on May 9, 2014, the DATA Act became the first federal law to mandate standardized data transparency. It requires the entire federal government to publish to adopt a consistent dataRead… Read more »

Your Mentorship FAQ

There are infinite benefits to a successful mentorship. But how do the mentor and mentee achieve those results? We heard that and many other questions at the kickoff to GovLoop’s own mentorship program. Thankfully, we had six successful, former mentors and mentees on hand to explain how to make the most of a mentorship. We’veRead… Read more »

How Ann Dunkin Encourages Girls in STEM through Public Service

It’s still rare to see a woman running a government agency (only 34 percent of the SES is female), and it’s even rarer for that woman to be holding a technology position. Therefore, it was really a thrill to speak with Ann Dunkin, who currently serves as chief information officer at the US Environmental ProtectionRead… Read more »

Reprioritizing to Enhance Cyber Capabilites

The following post is an interview with Bob Lentz, Member of FireEye’s Board of Directors, President of Cybersecurity Strategies, and former Deputy Assistant Secretary of Defense for Cyber, Information, and Identity Assurance. It is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines.  Though government spending on cybersecurity continues to increase, manyRead… Read more »

Your Cybersecurity Cheat Sheet

Unless you have an advanced degree in cybersecurity, you might be a little confused by all of the techy lingo used to define the threats to government information. How is an advanced persistent threat different from a regular threat? Is phishing what your dad makes you do on camping trips? Isn’t a troll just a mythicalRead… Read more »

Wins, Losses, and Next Steps for Female Feds

We’re making progress, but there’s more to be done. That’s the main takeaway from the Office of Personnel Management’s (OPM) recent report, Women in Federal Service: A Seat at Every Table, which used workforce data and Federal Employee Viewpoint Survey (FEVS) results to analyze that status of women in government. What I appreciate most about this reportRead… Read more »

Supporting Insider Threat Identification with Continuous Monitoring

The following interview with Chris LaPoint, Group Vice President of Product Management at SolarWinds, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The risk of insider threats isn’t anything new – recent breaches like WikiLeaks and Edward Snowden’sRead… Read more »

Three Steps to Securing Your Data

The following post is an excerpt from GovLoop’s recent industry perspective, Protecting Your Data in the Cloud. In the brief, we examine the challenges of cybersecurity in multi-tenant cloud environments, and offer three steps to achieving data transparency and security. According to Sol Cates, Chief Security Officer at Vormetric, agencies must take three steps toRead… Read more »