Sorting out Continuous Evaluation, Insider Threats and Cybersecurity
All about continuous evaluation and security in government.
All about continuous evaluation and security in government.
How to manage various compliance standards and keep your data safe.
The TSP Board is working hard to ensure that cyber attacks and risk factors are totally removed. It’s taking inspiration from the private sector too.
Learn how to tackle insider threats.
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
I want to kick off this series by looking back at the Into Dangerous Hands story, which aired during the CBS news program “60 Minutes”. In this segment, Scott Pelley reported on now-identified lapses in the process that grants U.S. Government security clearances, particularly profiling the cases of three people – Edward Snowden, Bradley ManningRead… Read more »
Learn why state and local law enforcement agencies and public healthcare facilities remain vulnerable to ransomware attacks.
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
In an interview with GovLoop, Jordan shared his experiences as Arlington County’s CISO and insights on needed improvements in the state and local cyber workforce.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »