Cybersecurity

Cyber Huddle: Hail Mary’s, Audibles & Sticking with the Run

Sprinkler systems. Elevators. CO2 monitoring. What do they all have in common? They are systems that can all be digitally accessed in modern buildings. They can also all be breached. In a world where digital thermostats can be compromised and reworked into spying microphones, how can public agencies possibly stay ahead of cyber security threats? AtRead… Read more »

Cybersecurity: We Need a New Mindset

Breaches are on the rise. Private entities are being hacked, again and again. And government agencies are not safe. Recently, Robert Anderson, executive assistant director of the Criminal, Cyber, Response, and Services Branch of the FBI told the Senate Homeland Security Committee that if a federal department thinks it hasn’t been hacked, it is likely that they areRead… Read more »

The Surprising Missing Link in Your Organization’s IT Security Strategy

Pop quiz: what’s the biggest cybersecurity threat to your IT system? A. Inadequate security technology B. Malicious employees C. You It might surprise you to learn the answer is often C. In light of the seemingly never-ending string of data breaches and cyber attacks in the news – from Target, to Home Depot, to celebrityRead… Read more »

Cybersecurity is About Context, Not Just People

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges. In the report, we answer 12 of their most pressing cyber questions. An interview with Philippe de Raet, Vice President of Strategic Alliances and Business Development, Experian Public Sector User authenticationRead… Read more »

Helping the Warfighter Maintain a Tactical Edge

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  To improve the way resources are shared across networks at the DoD, the agencyRead… Read more »

Welcome to the Post-Password Era

Passwords: from setting up your first AOL account to completing a banking transaction on your cell, these applications have all had them. But the enduring use of passwords may soon become a thing of the past. At Thursday’s GovLoop Training, Ensuring Safe Access for Government Users: The Evolution of Identity Management, we talked with DanRead… Read more »

New Threats Means New Solutions

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. Whether it’s the ability to pay parking tickets, speeding tickets, file permits, apply or disburse benefits, the internet has transformedRead… Read more »

Friday Night Cyber

Growing up in the suburbs of Columbus, one thing was crystal clear – Friday night was dedicated to our high school’s football game. No exceptions. You simply can’t grow up in Buckeye Country without having at least a passing interest in the game. Whether you knew the intricacies of the sweep play or you wereRead… Read more »