In this age of rapid technological innovation, organizations face many obstacles to ensuring cybersecurity. The rise of internet-connected devices is just one thing that’s forced agencies to rethink in 2018 how they secure technologies and their related endpoints that operate on their networks.
With today’s headlines abuzz with news about hackers, security breaches, and an unlimited array of online threats, it’s no wonder that achieving a solid network security posture has become a little like the quest for the Holy Grail.
Older hardware and software assets are favorite targets of cybersecurity threats looking to gain entry into systems holding sensitive information. They also are difficult and expensive to maintain.
Jan. 15 marks the first deadline in DMARC policy implementation for federal agencies. Here's a brief look into what that means, and how agencies are doing.
As government agencies increasingly turn to SecOps, they are also turning to the cloud and seeking the assistance of commercial cloud service providers to successfully migrate their platforms. Agency leaders will also need to continue refining security-based techniques to lower their risk profiles. More importantly, agencies should view cloud adoption as an extension of their... Read more »
Here are five in-house steps government agencies can take to help create a stronger line of defense from unknown cyberthreats.
With more than 20 billion devices predicted to be connected by the year 2020, managing a seamless and secure IT enterprise will be no small feat in the federal government’s increasingly complex environment.
Some governments, like the state of Michigan, have worked to overcome cybersecurity challenges with novel and cost-effective solutions.
At Smart Cyber, Symantec's 14th Government Symposium, we heard from Jeanette Manfra, Assistant Secretary in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). She explained how DHS is attempting to achieve that balance between challenge and opportunity.
It truly takes a village to conquer cybersecurity in government. There is no one person, role, department, or even organization that can execute a flawless cybersecurity strategy all on their own. The reality that gov faces is that cyberthreats are constantly growing in complexity and frequency, which means all agencies and all personnel need to... Read more »