Data-Centric Security for Self-Service Agencies
As digital transformation continues to push government services and citizen interactions online, safeguarding content and data in a landscape filled with laptops and mobile devices is a new challenge.
As digital transformation continues to push government services and citizen interactions online, safeguarding content and data in a landscape filled with laptops and mobile devices is a new challenge.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »
The proliferation of access points has added to the problem of keeping information safe. Now data is being accessed from remote work centers and employees’ homes or positions in the field, plus mobile devices and more. Here are four main access points to watch out for.
It’s well known that becoming a Foreign Service officer for the State Department can take a person on the journey of a lifetime. But there’s a different kind of journey that the State Department has been on — the journey of successfully adopting and deploying cloud computing technology departmentwide, and doing so securely.
To be effective in their security efforts, agencies must be proactive — using cyber analytics and cognitive-based systems to develop true security intelligence.
The Internet is an amazing place that allows children to meet and interact with people from around the world, but it also provides the bad guys new ways into your home that was heretofore unavailable.
What does it take to protect your agency’s network? Here are the five things you need to in place to avoid becoming the next ransomware casualty.
Phishing attacks, advanced malware, and ransomware are just a few of the types of cyberattacks that government deals with in today’s current cyberthreat landscape. In an attempt to counter such attacks, many agencies focus on tool-based strategies as cyberthreats come. But the problem with such approaches is that agencies are usually ill equipped to apply… Read more »
The good news is that there are ways to take steps to combat this growing activity of fraudsters while recognizing the good tax filers and applications, ultimately fostering a positive citizen experience.
Securing sensitive data against the sheer number of cyberthreats is an impossible task for a single organization. It’s akin to sending one soldier to battle against an army of millions. In an effort to strengthen the nation’s defense against cyberthreats, Congress passed and President Obama signed into law the Cybersecurity Information Sharing Act of 2015… Read more »