3 Best Practices for Improved Network Security
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
The first FITARA scorecards were released earlier this month by the House Oversight and Government Reform Committee’s Subcommittee on Information Technology, and the results weren’t great.
Let’s just take a step back and imagine a world in which we didn’t have people who forecasted the weather at all. Wouldn’t planning and dressing appropriately for the entire day (or even for different intervals throughout the day) be very difficult? The bottom line here is that forecasting is essentially the best solution weRead… Read more »
Your coworkers on the IT team are not the only ones who should feel responsible for cybersecurity in the workplace. Every employee, either on campus or at home, should feel accountable for the security of their networks and devices. With the increasingly interconnected world we live in today, there are unfortunately constant and countless opportunitiesRead… Read more »
The data collected, saved, utilized, and disseminated from the public is an essential part of government’s backbone. But at the same time, the government must be good stewards of the data. It’s their job to secure constituents’ data. But with great data collection comes even greater responsibility. In the 21st century, American citizens are demandingRead… Read more »
If your background investigation data was stolen in the massive OPM breach, here’s what you can expect during the notification process.
Healthcare technology is constantly evolving, and since much of it is accessible online, it is more important than ever for facilities and healthcare agencies to have comprehensive security measures in place.
A dangerous precedent is emerging, one that preaches the idea that because security measures aren’t foolproof and cyberattacks will happen, it’s more important to focus on reaction than prevention.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Most data breaches are caused by highly sophisticated malware, which can evade point-in-time detection technologies. Today, more than ever, it is essential for the government to protect its networks withRead… Read more »
Ever wondered what it’s like to be a Cyber Linguist or a Data Scientist? The National Security Agency is rolling out a nationwide initiative that lets you test your chops at solving real-world cyber scenarios.