Cybersecurity

Symantec Symposium Stops Cyberthreats in its Hacks!

Security is one of the biggest challenges that face our government as technology continues to expand is reach across the globe. It is more essential than ever for all government employees to understand how to secure their networks while handling vital information. Join leading IT security and management professionals in government at the 2015 SymantecRead… Read more »

Protecting Networks with Next Generation Firewalls

The following interview with Ken Karsten, Vice President of Federal Sales at Intel Security, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Front Lines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Because government serves citizens, agencies cannot achieve their missions without opening their secure networks toRead… Read more »

The Similarity of Passwords to Symmetric Key

By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first lineRead… Read more »

Lessons Learned from the Nevada Department of Transportation

This post is an excerpt from GovLoop’s recent industry perspective. To read the full piece, click here. Splunk helps dozens of agencies combat cyberthreats. Here’s how the Nevada Department of Transportation (NDOT) uses it. Since 1917, NDOT has maintained, planned, constructed and operated the state’s highway system. Located in Carson City, the division employs moreRead… Read more »

Cyberspace: Asset or Liability?

Cyberthreats are a national emergency. That’s what President Obama declared in an executive order signed yesterday, that also authorized the levying of targeted sanctions against individuals or groups involved in malicious cyber activities aimed at the U.S. With this most recent action to address the growing cybersecurity challenge, it was especially timely to hear fromRead… Read more »

Creating an Adaptive Cybersecurity Strategy & Culture through Agile Cybersecurity Action Planning (ACAP)

Cybersecurity should not about just building better castles, but looking ahead to the emerging threats. Castles were undone by introduction of cannons and mobile warfare. This will likely be true of Cybersecurity because the “cyber barbarians,” whether state or non-state actors, criminals or hacktivists, are constantly looking for new technologies, human weakness, back doors and… Read more »

How TRAP Protects Tax Refunds

Written in collaboration with Neli Coleman, Director of Product Management, Experian Public Sector The speed at which income tax returns are processed and issued has accelerated in recent years. Now, it’s just a matter of weeks, sometimes even days, before a refund is released. This improvement has been a win for government customer service. However,Read… Read more »

The Top 5 Privacy and Security Laws you Should Know

Privacy and security are more important than ever, especially with the recent barrage of cyber attacks on companies like Anthem, Premera and Sony which compromised confidential data of millions of customers Privacy and security compliances are requirements that various organizations must follow to protect that same data. There are compliances that span across many industriesRead… Read more »