The Small Business Administration and another unnamed agency are conducting a pilot that, if successful, will enable a workaround to the TIC.
How security teams can understand business and mission need while still keeping cloud operations and data secure.
Continuous Monitoring (CM) is being replaced with Continuous Diagnostics and Mitigation (CDM). The key change is going from monitoring to mitigation and therein lies the problem.
To learn how organizations leverage the flexibility of cloud without decreasing their security posture, GovLoop sat down with Felipe Fernandez, Director of Systems Engineering at Fortinet Federal. Fortinet Federal provides solutions and services to help agencies build robust cybersecurity.
In this age of rapid technological innovation, organizations face many obstacles to ensuring cybersecurity. The rise of internet-connected devices is just one thing that’s forced agencies to rethink in 2018 how they secure technologies and their related endpoints that operate on their networks.
With today’s headlines abuzz with news about hackers, security breaches, and an unlimited array of online threats, it’s no wonder that achieving a solid network security posture has become a little like the quest for the Holy Grail.
Older hardware and software assets are favorite targets of cybersecurity threats looking to gain entry into systems holding sensitive information. They also are difficult and expensive to maintain.
Jan. 15 marks the first deadline in DMARC policy implementation for federal agencies. Here’s a brief look into what that means, and how agencies are doing.
As government agencies increasingly turn to SecOps, they are also turning to the cloud and seeking the assistance of commercial cloud service providers to successfully migrate their platforms. Agency leaders will also need to continue refining security-based techniques to lower their risk profiles. More importantly, agencies should view cloud adoption as an extension of their… Read more »
Here are five in-house steps government agencies can take to help create a stronger line of defense from unknown cyberthreats.