How Human Centered Design Can Help Your Agency
Perhaps its time to consider a new approach that puts people at the center, or human-centered design (HCD).
Perhaps its time to consider a new approach that puts people at the center, or human-centered design (HCD).
California is the king of innovation, from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it’s not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
According to Scott Carlson of BeyondTrust, a privileged access management and vulnerability management solutions provider, these federal initiatives fall short of truly protecting government IT from credential misuse.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
In the aftermath of a massive security breach and the resignation of its director, the Office of Personnel Management (OPM) has taken 2016 as an opportunity to re-evaluate internal processes and strengthen its cybersecurity defenses. As part of those efforts, OPM appointed Clifton Triplett as Senior Cyber and Information Technology Adviser.
When it comes to defending government systems against sophisticated cyberthreats, the biggest challenge for agencies isn’t a technological one. Even the most secured systems can be infiltrated by hackers who prey on one of the hardest areas for agencies to manage: the workforce.
Now that some of the greatest threats to the United States are from cyberattacks, rethinking your agency’s defense infrastructure is critical
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
We sat down with experts from HHS and FedRAMP to discuss how the cloud security program has evolved, government’s privacy concerns and security challenges.
Is your agency unsure how to approach cybersecurity? Check out these solutions from the private sector that take a holistic approach to securing networks.