Understanding the Insider Threat Landscape
“Insider threat” is an ambiguous phrase, as it denotes any individual with access to an organization’s insider information.
“Insider threat” is an ambiguous phrase, as it denotes any individual with access to an organization’s insider information.
If you fail to deploy high availability strategies for critical applications, it will result in a significant loss – either in downtime, data or your organization’s reputation.
In honor of Cybersecurity Month, we put together this interactive quiz to help you find out what your insider threat level is. Are you red, yellow or green?
Despite challenges from a cybersecurity workforce shortage, some agencies are making progress to improve hiring and employee training.
The MGT Act has revamped national efforts to upgrade IT systems, but there remain fundamental questions about the government’s role in technology.
Fear not – GovLoop’s latest explainer video describes why blockchain might become the protection today’s governments need.
Federal spending on software totals more than $6 billion a year and is an area ripe for savings. Here are some tips to get software spending under control.
Cybersecurity is a vast and varied field for government, especially when you consider budget and workforce shortages that can further strain cyber teams. However, many agencies are stepping up to the challenge and finding innovative ways to address cyberthreats. Broadly, there are four major cyber advancements we see across government.
Among the chief benefits of government-grade clouds is that they help agencies manage their growing mission compute needs while remaining nimble and well-shielded from cyberthreats.
This article is an excerpt from GovLoop’s recent report titled “Your Guide to Key Advancements in Government Cybersecurity.” Download the full report here. A cyberthreat against one is a cyberthreat against all, especially for state and local governments. They are increasingly uniting against their common enemies to boost their mutual cybersecurity postures. And the foes areRead… Read more »