Cybersecurity

Could You Be the Next Cyber Attack Victim? Online Training

President Obama recently signed the Improving Critical Infrastructure Cybersecurity Executive Order, mandating the development of standardized cybersecurity preparedness and a response plan for each government agency. Public sector leaders can agree that cybersecurity is important, but it is also a field rife with challenges. That’s why GovLoop and Juniper hosted an online training that discussedRead… Read more »

Worldwide Cyber Attacks

The Government Security News published an article titled: “German Telecom Company Provides Real-Time map of Cyber-attacks”. If it is credible, and at this point I have no reason to doubt its credibility, it is a fascinating bit of technology. Deutsche Telekom (the folks behind T-Mobile) indicates that there are about 450,000 cyber-attacks worldwide per day.Read… Read more »

Your Cybersecurity Cheat Sheet

Usually, the conversation about cybersecurity emphasizes avoiding cheats and short cuts. Cybersecurity is something that every employee must be thorough about. However, convincing your agency to adopt an innovative, effective, and user-friendly cybersecurity strategy should not be as complex as an analytics algorithm. That’s why GovLoop has broken down the essentials for you. Below you’llRead… Read more »

National Cyber Security Awareness Month Kick Off With Theme of “Shared Responsibility”

Posted from Federal Blue Print – http://federalblueprint.com/2013/national-cyber-security-awareness-month-kick-theme-shared-responsibility/ This month the National Cyber Security Alliance (NCSA) kicks off the 10th anniversary of its National Cyber Security Awareness Month, which is lead by NCSA and the Department of Homeland Security (DHS). This year’s theme is “Our Shared Responsibility,” and today the NCSA is hosting an event atRead… Read more »

8 Ways To Mitigate Cybersecurity Risks

Achieving your agency’s mission with the newest technology is a necessary step to modernize services and to keep pace in the digital era. However, virtualization can make your agency more vulnerable if it is not paired with the right security measures. In GovLoop’s new Agency of the Future series guide, “Winning the Cybersecurity Battle,” featuresRead… Read more »

GovLoop Resources for Cybersecurity Month

Throughout the month of October, the Department of Homeland Security will be celebrating National Cyber Security Month. To help build broader awareness, GovLoop will also be highlighting our cyber related guides, trainings and infographics as a means to educate and inform on cyber related issues. Today, cyber includes much more than just our personal identityRead… Read more »

Creating Resilient Security for Today’s World

Regardless if agencies are adopting cloud, mobile, data storage, or cybersecurity initiatives – agencies are facing increasing pressures to leverage new and emerging technology safely and securely. That’s why I am excited to attend the Symantec Government Symposium on October 2nd at the Walter E Washington Convention Center. The event brings together leading global ITRead… Read more »

New Report – Federal Agencies Challenged to Address Insider Threats

Originally published on Federal Blue Print The Information Sharing Environment (ISE) recently issued a report that highlighted how many federal agencies are currently challenged when it comes to dealing with insider threats. Forty four percent of 39 agencies surveyed reported that they had not yet met the minimum standards required for an effective insider threatRead… Read more »

What You Should Know About Cyber Heists

Our resident security expert and a retired Army JAG David Willson, JD, LLM, CISSP, Security+, shared this blog with us on cyber heists. A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials,Read… Read more »

Seven Habits of Highly Secure People

Earlier this year I attended a workshop at AFCEA’s West13 conference lead by Jeff Moulton, principal research associate at the Georgia Tech Research Institute. He shared his “Seven Habits of Highly Secure People.” Moulton pointed out that as humans, we all function in different ways with different habits. “Everyone in this audience goes about theirRead… Read more »