Cybersecurity

Zero to ‘Secure’ in 60 Seconds: 3 Tips for Using Agile Security to Create a Security Posture

You’re hired…. Now ‘do’ security! That’s a common challenge to information security professionals hired into an organization that previously had not staffed security positions.  Daily breach headlines, and evolving threats, can make the pursuit of a security program the equivalent of a game of ‘Whack-a-Mole’.  After spending a few years in the security consulting arenaRead… Read more »

Protecting Yourself from Cyber Crime

Perhaps you or somebody you know was a victim of one of the security breaches at the Office of Personnel Management. After all, 21 million people were affected by having their personal records stolen or compromised. The incident was one of the central topics at the breakout session titled “Cybersecurity Best Practices: Have Good CyberRead… Read more »

OPM Cybersecurity #Fail, As Told By Twitter

Last week, the Office of Personnel Management (OPM) announced that “sensitive information” on 21.5 million personnel was stolen from their systems. Today, OPM announced additional information about the recent cyber incident Learn more: http://t.co/YrWkqJKyYO. pic.twitter.com/46pLmaWMxJ — Beth Cobert (@CobertFormerOPM) July 9, 2015 Soon after this “enormous breach” (so said FBI director James Comey) was announced, OPMRead… Read more »

OPM Director Katherine Archuleta’s Resignation Statement

“Today I informed the OPM workforce that I am stepping down as the leader of this remarkable agency and the remarkable people who work for it. This morning, I offered, and the President accepted, my resignation as the Director of the Office of Personnel Management. I conveyed to the President that I believe it is… Read more »

Maintaining Endpoint Security Across an Expansive Network

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. The Department of Defense’s information network spans the globe. Yet while that asset is necessary to support a distributed workforce and worldwide mission,Read… Read more »

Identity at Risk? Here’s What to Do

Government hacks have left over 4 million more people dealing with identity theft today than were dealing with it before. Not sure what we’re talking about? Find out more here, we’ve broken down the 12 things you need to know. A data breach doesn’t necessarily mean that everyone’s identity will be misused tomorrow. For some,Read… Read more »

Beyond Security: How Endpoint Protection Facilitates Mission Success

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. In an increasingly interconnected world, securing every network endpoint is a major challenge, especially for an organization as large as DoD. More connections,Read… Read more »

Practical Lessons Employees Can Learn from the OPM Breaches

This story is the first in a new bi-weekly GovLoop series called “The Intersection”. The goal is to make technology relevant and easy to understand for all government employees. Consider this blog the bridge that connects you (the tech user) with the tech innovators and policy makers. The next post will be published on GovLoop.comRead… Read more »