Cybersecurity

Achieving Real-Time Defense with the Internet of Everything

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. The mission of DoD “to provide the military forces needed to deter war and to protect the security of our country” remains steadfast.Read… Read more »

What HTTPS Everywhere Means for Federal Agencies

On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in theRead… Read more »

7 Ways You Might Not Know You’re Putting Your Agency at Risk

>> Want even more information about the OPM breach? Read our recent post, 12 Things You Should Know About the OPM Breach The recent Office of Personnel Management (OPM) data breach has everyone on edge. The personal information of approximately 4 million current and former federal employees may have been compromised by hackers. The OPM will be contactingRead… Read more »

12 Things You Should Know About the OPM Breach

There is no shortage of information on the interwebs about the massive Office of Personnel and Management breach that left computer systems and data exposed to hackers. The hard part is cutting through the jargon and speculation to understand what happened and what this hack means for you, especially if you’re one of the 4Read… Read more »

Can You Put a Sensor on a Bull and Call it the Internet of Things?

An odd question to ask, right? But the answer is, theoretically, yes, you can put a sensor on a bull and call it the Internet of Things. That’s not exactly a direct quote from Peter Romness, the Cybersecurity Solutions Lead for the U.S. Public Sector at Cisco, but while discussing what is a part ofRead… Read more »

Creating a Robust Insider Threat Program at Any Agency

This interview is an excerpt from GovLoop’s recent research brief, Combating Insider Threats. Insider threats are constant and varied within government, which can lead many agencies to think they are an inevitable occurrence. In reality, there are a number of tactics that agencies can pursue to mitigate the risk of an internal breach. To betterRead… Read more »

Recruiting Cyber Soldiers

Take a backseat, weather – cybersecurity breaches are taking over headline news. From the Sony Pictures hack to the IRS data leak, these breaches are a growing concern to the private and public sector alike. According to a 2014 CNN report, cyber attacks involving government agencies increased a staggering 35 percent between 2010 and 2013.Read… Read more »

Cybersecurity and the Missing Workforce

Government increasingly spends more time, money, and effort into strengthening cybersecurity. But is government getting the return on such investments that it should? (ISC)2, the largest not-for profit membership body of certified information and software security professionals worldwide, recently released its seventh Global Information Workforce Study (GISWS) in partnership with Booz Allen Hamilton, Cyber 360Read… Read more »

Creating a Holistic Environment with Multiple Solutions

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. The Department of Defense is an incredibly multifaceted organization. To support that complexity, DoD personnel must craft an equally dynamic IT architecture whileRead… Read more »

Preparing Your Agency for Evolving Threats

This interview with Sean Applegate, Director of Technology Strategy & Advanced Solutions at Riverbed Federal, is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Cyberthreats are not static – they constantly evolve to target different vulnerabilities in new ways. Therefore,Read… Read more »