A DMARC Deadline Is Fast Approaching. Who’s on Track?
Jan. 15 marks the first deadline in DMARC policy implementation for federal agencies. Here’s a brief look into what that means, and how agencies are doing.
Jan. 15 marks the first deadline in DMARC policy implementation for federal agencies. Here’s a brief look into what that means, and how agencies are doing.
As government agencies increasingly turn to SecOps, they are also turning to the cloud and seeking the assistance of commercial cloud service providers to successfully migrate their platforms. Agency leaders will also need to continue refining security-based techniques to lower their risk profiles. More importantly, agencies should view cloud adoption as an extension of their… Read more »
Here are five in-house steps government agencies can take to help create a stronger line of defense from unknown cyberthreats.
With more than 20 billion devices predicted to be connected by the year 2020, managing a seamless and secure IT enterprise will be no small feat in the federal government’s increasingly complex environment.
Some governments, like the state of Michigan, have worked to overcome cybersecurity challenges with novel and cost-effective solutions.
At Smart Cyber, Symantec’s 14th Government Symposium, we heard from Jeanette Manfra, Assistant Secretary in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). She explained how DHS is attempting to achieve that balance between challenge and opportunity.
It truly takes a village to conquer cybersecurity in government. There is no one person, role, department, or even organization that can execute a flawless cybersecurity strategy all on their own. The reality that gov faces is that cyberthreats are constantly growing in complexity and frequency, which means all agencies and all personnel need toRead… Read more »
If you’re in government work, you’ve probably seen your fair share of articles about blockchain. But who’s using it, and how?
If government wants to run as efficiently and securely as possible, rethinking data classification, cyber education tactics and modern hybrid cloud solutions are excellent ways to start.
As organizations and citizen users increasingly depend on websites, mobile computing and web-based applications, they become exposed to greater privacy and security risks. Because of the open infrastructure of the Internet and the growing availability of hacking tools, almost anyone can carry out a cyberattack against any organization or user relying on networked applications and… Read more »