Cybersecurity

The Cyber War We Are Losing

We are constantly on our smart phones. We rely on apps such as Google Maps, our favorite news site, or social media outlets (i.e. Facebook and Twitter). Subsequently, a lot of our information is floating around. We’ve heard about the danger this can put us in, but did you know we are also currently inRead… Read more »

How DHS is Creating the Future of Cybersecurity

With constant news about breaches detected and how government is managing the fallout from them, it seems like we are in a reactive state of cybersecurity today. Will that always be the case? If not, what does the future of government cybersecurity look like? At our event, Evolving Tactics to Combat the Cyber Threat, MarkRead… Read more »

Interagency Approach to Cybersecurity

At Tuesday’s GovLoop event, “Evolving Tactics to Combat the Cyber Threat,” govies kicked off the day by focusing on a critical strategy to better tackle cyber threats: interagency collaboration. Michael Garcia is the Acting Director of the National Strategy for Trusted Identities in Cyberspace (NSTIC) at the National Institute for Standards and Technology (NIST) underRead… Read more »

Are You Overlooking Print Security?

In today’s connected world, cybersecurity is far more than keeping malicious applications off your smartphone or thwarting attacks before they wreak havoc on your computer systems. It seems just about anything can — and is — being connected to the Internet these days, and with that increased level of connectivity comes an increased level ofRead… Read more »

The Three Steps to Securing Your Data

It is more important than ever for government agencies to get on board with protecting the data they are entrusted with. Unfortunately, this is a classic example of a task that’s easier said than done. Combined with the speed at which we share data and the increasing amount of data being stored, it is becomingRead… Read more »

How Employees In ‘Mission-Critical Occupations’ View Federal Work

IT specialists are among the most sought after professionals in the federal government, yet they do not give the government high ratings when it comes to recruiting, retaining or training them.

Securing the Perimeter Before A Cyber Attack

“There are two kinds of CIOs: ones who have been hacked and know it, and those that have been hacked and don’t realize it yet. But the reality is, you’ve been hacked.” This is a startling statement from Tony Scott, the CIO of the Office of Management and Budget, that emphasizes the massive cyberthreat toRead… Read more »