How Device Management Can Help You Prepare for the Worst
Given the wide variety of end-user devices, agencies can struggle to apply consistent governance and cyber hygiene practices, especially in a time of crisis, such as a natural disaster.
Given the wide variety of end-user devices, agencies can struggle to apply consistent governance and cyber hygiene practices, especially in a time of crisis, such as a natural disaster.
Agencies cannot discuss future innovation without also talking about cybersecurity. Let’s dive into some key considerations for agencies to create a secure digital ecosystem: Building a Stronger Cyber Foundation Agencies need to address two givens in today’s cyber landscape: that the risk of attacks continues to grow —so they need to adopt better defenses —Read… Read more »
In today’s threat environment, where ransomware and other attacks aim to steal and exploit user credentials, a focus on identity “is the first step in securing state and local systems,” said James Imanian, Senior Director, U.S. Federal Technology Office at CyberArk. Yet many state and local IT teams struggle to implement strong identity controls.
In state and local governments, much of the operational technology (OT) that monitors and controls critical infrastructure is based on legacy technology. That presents a major cybersecurity challenge. See how to upgrade — simply.
Identity-based cybersecurity threats are on the rise. The number of phishing attempts — the most common type of cyberattack — increased 62% from 2023 to 2024, for instance, and identity-related incidents have directly affected 84% of organizations this year. Learn how to protect your agency.
No state or local entity should assume that it’s too small or innocuous to undergo a cyberattack. Here’s how North Dakota prepares.
At the state and local level, adopting AI remains only one of a long list of IT priorities. Read how Burlington, VT is approaching it.
DHS has developed the Unified Cybersecurity Maturity Model, a framework that allows the agency to tie the investment dollars to the cybersecurity of programs and their component systems.
Many agencies have some of the foundational capabilities of zero trust in place already, such as Identity, Credential and Access Management (ICAM). “What zero trust calls us to do is take all of these capabilities to the next level. That’s not a technological solution,” said Steven Hernandez of the Department of Education. “Zero trust is… Read more »
The upcoming change in administration presents both opportunities to modernize cybersecurity and AI governance in government operations and risks of heightened vulnerabilities, requiring strategic action and vigilance.