10 Ways the Government Is Wooing Cyber Pros
Plans include providing more rotational job opportunities in and outside of government and creating a cyber track for the Presidential Management Fellows program.
Plans include providing more rotational job opportunities in and outside of government and creating a cyber track for the Presidential Management Fellows program.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. A flood of unstructured data is entering government, with no signs of slowing. This has serious implications on security as unstructured data gives less visibility to agencies, making them more vulnerable to cyberattacks. Additionally, agencies are struggling to gain controlRead… Read more »
To understand the best ways to secure agency networks, GovLoop spoke with Will Ash, Senior Director of U.S. Public Sector Security at Cisco, an industry leader in networking and cybersecurity.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. Agencies continue to rapidly implement new security monitoring tools with the goal of identifying actions impacting security within each layer of their environment. This growth of management and monitoring tools has negatively impacted systems and application performance due to theRead… Read more »
Perhaps its time to consider a new approach that puts people at the center, or human-centered design (HCD).
California is the king of innovation, from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it’s not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
According to Scott Carlson of BeyondTrust, a privileged access management and vulnerability management solutions provider, these federal initiatives fall short of truly protecting government IT from credential misuse.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
In the aftermath of a massive security breach and the resignation of its director, the Office of Personnel Management (OPM) has taken 2016 as an opportunity to re-evaluate internal processes and strengthen its cybersecurity defenses. As part of those efforts, OPM appointed Clifton Triplett as Senior Cyber and Information Technology Adviser.
When it comes to defending government systems against sophisticated cyberthreats, the biggest challenge for agencies isn’t a technological one. Even the most secured systems can be infiltrated by hackers who prey on one of the hardest areas for agencies to manage: the workforce.