Cybersecurity

Finding the Right Balance to Credential Agency Users

The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »

3 Reasons to Care About Defense Budgets

Home security and personal security are subjects everyone can relate to, and safely assumed to share the same level of importance to most people. While we might not conscientiously put thought into foiling a burglary or assault, we do in fact take steps to enable successful prevention of crime…we take steps to protect ourselves. As… Read more »

A Call To Arms For Cybersecurity

Think back over the recent history of high-profile cyberattacks. Target, Sony, CENTCOM, celebrity nude photos, to name a few, but the list goes on. It’s starting to seem like every time we open our news portals, there’s word of yet another breach in cybersecurity. Chris Dorobek, host of the podcast DorobekINSIDER, recently interviewed a leadingRead… Read more »

It’s Time for Your Security Health Check

If you were feeling a little unsettled about possibly missing a list of “all-things cybersecurity products” offered on GovLoop’s “From Framework to Action: Understanding the NIST Cybersecurity Framework” online training yesterday, I’m here to tell you that it may be time for your security posture check-up. “The idea of security being a certification or aRead… Read more »

“Hello, My Name Is…and I Am Afraid of Being Hacked.”

For the first time since I became an internet user (1998), I admit that I am afraid of being hacked, and apparently, I am not alone. According to Reuters, U.S. citizens fear having their credit cards, computers, or smartphones hacked more than any other crimes.[1] Six years ago, I planned our Florida destination wedding entirelyRead… Read more »

How to Protect Your Agency’s Social Media from Hackers

On January 12, a group claiming to be connected to ISIS hacked the Twitter and YouTube accounts of U.S. Central Command, also known as CENTCOM. If the military can be hacked, is your agency’s social media vulnerable to a hacker attack? How can your agency protect itself on social media? The hack of CENTCOM’s socialRead… Read more »