Ransomware: Emergent Threat or Opportunity?
The ransomware surge complicates the risk management picture, but it may also help bring priorities into focus.
The ransomware surge complicates the risk management picture, but it may also help bring priorities into focus.
A primary responsibility of DHS is maintaining and securing the assets, systems, and networks comprising the 16 critical infrastructure sectors. That’s no easy task and it’s only getting more difficult.
How can a group of individuals spread across the globe, working behind their personal computers, with no real budget, successfully take down organizations and governments with millions—sometimes billions—of dollars to spend on cybersecurity?
If you’re a federal IT decision maker, it’s worth taking time to analyze your defenses and question your readiness to tackle new age cyberthreats.
“Agencies must keep in mind that applying security measures to digital content must be easy, and that’s where automation helps.” —John Landwehr
IoT provides a number of potential benefits for the federal space, but risks remain. There’s a long road ahead, but with stronger authentication methods, education and industry collaboration, the federal government could thrive in the IoT revolution.
If you’ve already begun investing in cloud services, or doing the due diligence to select the right cloud, it may be time for a check-up to make sure your investments not only support your needs today, but will continue to scale into the future.
Have you ever wondered what your Chief Information Officer is thinking about all day? What keeps them up at night? What makes them excited to go to work? What makes them want to pull their hair out? We found out.
Developing a truly effective cybersecurity culture requires that agencies take a deeper look at how they promote and enforce cybersecurity policies among their employees. With that in mind, here are five tips we’ve found beneficial for fostering a cyber-aware professional culture.
Still not sure what NIST’s Cybersecurity Framework means for your agency? Check out our three takeaways from a recent chat with cybersecurity experts.