As part of the expanding Continuous Diagnostics and Mitigation (CDM) program, the Homeland Security Department (DHS) plans to bring on another 30 employees to evaluate, monitor and standardize cybersecurity capabilities across agencies.
Penned in the 1960s, the “Fifty Nifty United States” song is a favorite of 3rd grade classrooms across the country. But is it’s mantra true, that every state really is unique, and if so, does that uniqueness extend to IT.
The answer may come from how agencies are discussing cybersecurity with potential employees. Too many agencies may present cybersecurity as a losing battle.
Cybersecurity seems simple enough. The old methodology went something along the lines of installing a strong IT network, training employees to identify and avoid risks, and locking down the most sensitive information in-house.
Today’s cyberthreats include foreign governments, criminals, hacktivists and terrorists. Their motivations range from financial gain to hurting the U.S.
One of the challenges to keeping government secure comes from how scattered cybersecurity tools, services and governance is. To combat this issue, a concerted effort is being made to consolidate these pieces of the cybersecurity puzzle to patch up holes and make spending more efficient.
In part 1 of this story, we used a bank robbery as a metaphor for a cyberattack. At the end of Part 1, the robbers had made it to the vault. In part 2 we will consider how they break in and how they get the goods back out. Step 4: Breaking into the VaultRead… Read more »
A focus on some of the cybersecurity threats facing municipalities today.
There’s a popular saying that “numbers never lie.” It has a nice ring to it, but in reality, the adage requires that the numbers share a common language.
Bank robbery as a metaphor for a cybersecurity breach to explain how bad guys get in, how they find valuable information, and how they get out with the goods.