Best Practices for Dealing With Insider Threats
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
Without a modern network, it’s nearly impossible for state and local governments to meet growing citizen expectations, security standards, maintenance requirements and more.
What exactly does the CSF recommend and how can governments use it to tackle their own unique organizational concerns?
In an environment where cyber knowledge is more valuable than ever, two lawmakers have proposed legislation that would allow skilled cyber workers concentrated in one agency to tackle problems at other agencies.
In response to network security challenges, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program. The CDM Program is organized into four distinct phases designed to address each layer of agency cybersecurity. We’re tackling Phase 4.
California recently became America’s first with laws mandating basic security standards for IoT devices. The move may inspire similar legislation elsewhere.
CIOs and CISOs should take note of the federal advocacy priorities released by NASCIO, which include aligning federal cybersecurity regulations.
Federal agencies often overlook the recovery step of a cyberattack. Given all the energy that agencies must put into detecting, defending and responding to an attack, this omission is understandable, but today more than ever, recovery is critical.
In the wake of the administration’s Cloud Smart strategy, VA is moving all of its existing applications to cloud and building all of its new applications to be cloud-ready.
CISA released an emergency directive about a number of incidents concerning Domain Name System (DNS) infrastructure tampering.