Government Cybersecurity Failure
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
I want to kick off this series by looking back at the Into Dangerous Hands story, which aired during the CBS news program “60 Minutes”. In this segment, Scott Pelley reported on now-identified lapses in the process that grants U.S. Government security clearances, particularly profiling the cases of three people – Edward Snowden, Bradley ManningRead… Read more »
Learn why state and local law enforcement agencies and public healthcare facilities remain vulnerable to ransomware attacks.
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
In an interview with GovLoop, Jordan shared his experiences as Arlington County’s CISO and insights on needed improvements in the state and local cyber workforce.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
Learn how to organize your content so that it remains secure.
Arlette Hart is the chief information security officer (CISO) at the Federal Bureau of Investigation. As CISO of the FBI, she has a unique perspective. On the one hand, she is tasked with securing vast amounts of highly sensitive information. On the other, she has the inside track on the emerging cyber-threats, and some ofRead… Read more »
To keep pace with the frequency and sophistication of evolving cyberthreats, agencies can’t rely on reactive security defenses and techniques. What agencies need is a layered security defense that ensures they’re prepared to quickly detect and thwart malicious actors before they wreak havoc on government networks.