National Defense, Cybersecurity and the Tech Industry
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
Millennials demonstrate poor knowledge of cyber awareness. Learn how you can improve your cybersecurity practices for the sake of Gen Y.
As government relies more heavily on information technology to store, manage and access critical data, it also creates greater potential for that information to be misused or exposed. According to one Government Accountability Office report, the number of cyber incidents in the federal space in 2014 was 12 times higher than it was in 2006.
Creating a vision of health care technology that can support the health of all Americans in smart and efficient ways is no easy task. Though much progress has been made across the health IT market, several challenges still remain – everything from dealing with cybersecurity and interoperability issues to health care modernization and more.
Federal networks and systems today are under unrelenting attack by persistent, sophisticated and resourceful adversaries who operate on behalf of nation states or criminal groups with the aim of stealing sensitive data, causing harm or exploiting federal and military systems.
Under FITARA, the visibility and intelligence that CIOs are expected to have about their agencies’ IT domains will also inform their CISOs about where critical assets exist that require better defenses and where vulnerabilities exist that require remediation.
Particularly at the state and local levels, the number of cybersecurity-related jobs already outnumbers people qualified to fill them, and that demand is growing rapidly. To counter that shortage, some organizations are creating new strategies to organize and recruit cyber professionals.
With application-layer security, applications remain protected even if initial authentication procedures are faulty or circumvented by hackers. Think of it like adding additional protection to your house to keep out intruders, rather than just relying on the fence surrounding your yard. With bars on your windows or an alarm at your front door, you are… Read more »
The legacy infrastructure supporting IT functions has often been resilient. And to its credit, it often demands little attention, allowing for a level of complacency. But with this complacency comes risk.
Suggestions on how to improve the interaction between project management and security teams.