Cybersecurity

Trust: Then and Now

With the growing frequency and sophistication of cyber threats, being breached has become the rule, not the exception. Despite spending $28 billion annually on IT security, a recent study reported that over 90% of organizations have been breached. Data from KPMG corroborates the statistic, reporting a 93% breach rate. Each new week brings a newRead… Read more »

You’ve Been Hacked: Now What?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions.   Having a strong cyberattack response plan is critical to the security and effectiveness of any organization. Recent data securityRead… Read more »

GovLoop Training: Secure Your Network & Protect Your Agency

It’s a scary digital world out there. A recent GAO study found that cyber attacks on government have increased 782% between 2006 and 2012. With increasing amounts of sensitive data stored in your network or cloud, your agency faces risks that are not to be taken lightly. It’s not all doom and gloom, however. There are stepsRead… Read more »

What Does it Mean to Be Secure?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions.   Maintaining and protecting valuable assets are two of government’s most important tasks. Your agency may very well hold crucialRead… Read more »

You Can Only Build So Many Walls

For years the IT community has been building walls and digging moats to keep out cyber attackers. Now the focus has shifted. Rather than zero-in on outside invaders, security experts have set their sights on internal vulnerability. – Federal Times. Automation alone can’t prevent cyber attacks. Why? “It is critical to have people standing onRead… Read more »

The Geospatial Approach to Cybersecurity

Scott Cecilio, Esri solution engineer, speaking at the GovLoop and Esri Meetup Cybersecurity professionals face an unprecedented challenge as our world has become more connected. Although this connectivity has streamlined communications and helped us connect easier than ever before, we are also exposed to increased risk. To help address these issues, GovLoop and Esri hostedRead… Read more »

Digital Property is “Real” Property: 5 Ways to Treat it That Way

Although we’re in at least the seventh decade of the Digital Era, and people realize how integral social and digital technologies are to both our personal and professional lives, there is still a very strong tendency to underestimate the critical role of digital property in managing a brand identity, pursuing goals and objectives, and managingRead… Read more »