Cybersecurity

Helping the Warfighter Maintain a Tactical Edge

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  To improve the way resources are shared across networks at the DoD, the agencyRead… Read more »

Welcome to the Post-Password Era

Passwords: from setting up your first AOL account to completing a banking transaction on your cell, these applications have all had them. But the enduring use of passwords may soon become a thing of the past. At Thursday’s GovLoop Training, Ensuring Safe Access for Government Users: The Evolution of Identity Management, we talked with DanRead… Read more »

New Threats Means New Solutions

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. Whether it’s the ability to pay parking tickets, speeding tickets, file permits, apply or disburse benefits, the internet has transformedRead… Read more »

Friday Night Cyber

Growing up in the suburbs of Columbus, one thing was crystal clear – Friday night was dedicated to our high school’s football game. No exceptions. You simply can’t grow up in Buckeye Country without having at least a passing interest in the game. Whether you knew the intricacies of the sweep play or you wereRead… Read more »

Creating an Effective IT Framework: Is More Collaboration Needed?

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  Although the Joint Information Environment (JIE) is not officially a program of record, theRead… Read more »

Trust: Then and Now

With the growing frequency and sophistication of cyber threats, being breached has become the rule, not the exception. Despite spending $28 billion annually on IT security, a recent study reported that over 90% of organizations have been breached. Data from KPMG corroborates the statistic, reporting a 93% breach rate. Each new week brings a newRead… Read more »

You’ve Been Hacked: Now What?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions.   Having a strong cyberattack response plan is critical to the security and effectiveness of any organization. Recent data securityRead… Read more »