Cybersecurity

Automating Security to Create Virtual Trust

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. “Security is all about trust,” said Richard Breakiron, Senior Director of Cyber Solutions of ViON, an information technology enterprise solutions provider. But how do you create that trust in theRead… Read more »

Government Calling? Don’t Get Scammed

If you’ve used the Internet even once in your life, you’re probably familiar with scams. From the more obvious pop-up viruses to the well-disguised phishing emails, scams are an ever-present nuisance in our lives in the digital age. While you have likely encountered fraud attempts online before, what about over the phone? In the wakeRead… Read more »

The Air Force Has a Plan for Testing Cyber Aptitude

Much like the military’s use of the Defense Language Aptitude Battery to test a person’s ability to learn a foreign language, the Air Force is developing an assessment tool to help determine a recruit’s ability to operate in the cyber domain. There are assessments out there today, but the Air Force needs to decide how… Read more »

Crafting Effective Cyber Partnerships, One Agency At a Time

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Four years ago, the White House unveiled the Cloud First policy. The White House mandated that agencies must evaluate safe, secure cloud computing options before making any new investments. ItRead… Read more »

But What Is A Medjack?

Internet of Things (IoT) endpoints, any connected or smart device, are woven into almost any fabric of life, including public health and medicine. For example, IoT can be an implanted device such as pacemakers, insulin pumps, or cochlear ear implants. IoT is also an x-ray, MRI, blood gas analyzer, or Electronic Medical Records (EMR). These areRead… Read more »

The Aftermath of the OPM Hack

When news first broke of the OPM hack back in June, few understood the massive scale of the attack. Originally thought to have affected 4 million federal employees, estimates quickly rose to over 22 million impacted. Since that time, government agencies have scrambled to shore up their cyberdefenses and OPM has worked to provide identityRead… Read more »

Top 10 Cyber Management Mistakes

The majority of participants in GovLoop’s online training, Cybersecurity for Public Health – A Cyber War Game, said they weren’t sure if their organization is prepared for a cyber breach. And according to speakers Mike Hager, the Senior Security Architect for Teradata and Sam Harris, the Director of Cybersecurity for Teradata, your organization probably isn’t.Read… Read more »

When Good Isn’t Good Enough – Cyber Edition

In the wake of the OPM breach back in June, the federal government has been scrambling to patch cybersecurity vulnerabilities across the country. Federal CIO Tony Scott ordered a 30-day sprint, which tasked government agencies with addressing known vulnerabilities and establishing multistep authentication security frameworks. But as cyber threats against the government grow more advanced,Read… Read more »

Zero to ‘Secure’ in 60 Seconds: 3 Tips for Using Agile Security to Create a Security Posture

You’re hired…. Now ‘do’ security! That’s a common challenge to information security professionals hired into an organization that previously had not staffed security positions.  Daily breach headlines, and evolving threats, can make the pursuit of a security program the equivalent of a game of ‘Whack-a-Mole’.  After spending a few years in the security consulting arenaRead… Read more »