How to Solve the Cyber Data Conundrum
Agencies have plenty of data they can use to detect cyber threats. The trick is using it without breaking the budget.
Agencies have plenty of data they can use to detect cyber threats. The trick is using it without breaking the budget.
When it comes to generational differences in the workplace, the Golden Rule is probably not your best guide. It sounds like common sense. Why wouldn’t we treat our co-workers or direct reports the way we would want to be treated? But what you find encouraging or helpful or motivational might not resonate with your youngerRead… Read more »
Human factors are involved in 82% of cyber breaches. Here’s how to turn your “weakest link” into a “human firewall.”
Everyone wants to improve customer experience. But you can’t improve unless you know where you are, and where you’re going.
Supply chain cyber attacks are escalating. Vendors that can help remove weak links and defend against incursions are essential.
Increasing your cyber workforce may mean revisiting your requirements. Agencies should prioritize candidates with potential to develop skills.
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
Cybersecurity solutions based on perimeter defense are no longer adequate. Cloud, the explosion of IoT endpoints, and telework call for zero trust.
GovLoop polled its readers for their thoughts on “quiet quitting” and “quiet firing” — what they are, what causes those circumstances, what agencies can do to make things better and whether those situations even exist. The survey results were intriguing, and said a lot about the role managers play.
Zero trust isn’t just about technology. It also requires a change in mindset. Here’s how to take a holistic approach.