Cybersecurity

A Brief History of the Joint Information Environment

The Joint Information Environment (JIE) is an unbelievably ambitious yet necessary DoD initiative. Earlier, we shared a few statistics about the size and scale of the department’s IT shop, but here’s some additional context: DoD hosts more than 6,000 locations, supports 40 agencies and manages about 3.7 million people with cyber identity credentials. If those statisticsRead… Read more »

Playing Capture the Flag in the Digital Age

Sony was recently subject to one of the biggest hacks in history. The breach has led to the release of over 40,000 nonemployees’ Social Security numbers. This includes former employees and actors, dating as far back as 1984. This was in addition to the 6,500 current identities lost — and the hackers obtained several unreleasedRead… Read more »

Watch Your Back: How to Prevent Insider Threats

Edward Snowden. Robert Hanssen. Bradley Manning. Aldrich Ames. At one point, these people were all part of workforces that organizations depended on. But an organization’s backbone can soon become its biggest vulnerability. With insider threat costs ranging from $5,000 to $3 million per incident, how can your agency address the potentially devastating impact of anRead… Read more »

Empowering Agency Analysts to Minimize Risks

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. As public information is increasingly digitized, cyber threats and breaches have the potential to cause catastrophic damage. As society hasRead… Read more »

How Do You Balance Risk Against Innovation for Cyber?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges. In the report, we answer 12 of their most pressing cyber questions. In today’s technologically inundated world, cybersecurity is an issue that affects public and private sectors alike. GovLoop recently hadRead… Read more »

The Key to the Joint Information Environment: On-Demand Services

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  The Joint Information Environment (JIE) framework will build a modernized IT infrastructure at theRead… Read more »

Ho, Ho, Hoax: Tips to Avoid Holiday Cyber Scams

It’s around dawn, and you wake up with excited butterflies in your stomach. This isn’t any normal morning. This is Christmas morning, and you know you definitely landed on Santa’s Nice List this year. Once the realization hits that it’s Christmas Day, the comforter flies off and feet hit the ground running toward the tree.Read… Read more »

How Can You Combat Insider Threats?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. Insider threats can have severe consequences, with victim organizations facing significant costs and damages. According to the FBI, the averageRead… Read more »

Enabling an Integrated IT Environment From the Foxhole to the Cubicle

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  The Joint Information Environment (JIE), once deployed, will have far-reaching impacts on the wayRead… Read more »

Preparing for Phase 2 of the CDM Program

Government information networks have become more interconnected and diverse than ever before. As such, risks for cyberattacks have increased. To help civilian agencies detect, mitigate and mediate attacks, DHS has established the Continuous Diagnostic and Mitigation (CDM) program, which will enable government officials to gain increased visibility of their networks, and improve their cybersecurity postureRead… Read more »