How to Break up With Your VPN (and Improve Security)

Many remote workers use VPNs to gain secure access to government applications and data. Unfortunately, if a significant amount of traffic hits the VPN at once, it can cause performance problems that hinder productivity and add opportunities for cyberattacks. Check out this video to see how agencies can solve both issues by providing a simple andRead… Read more »

Keeping Data Secure in a Digital Workspace

Digital collaboration is a good thing, right? Of course, it is. But it’s also a potential cybersecurity risk. The problem is that zero trust and other approaches to cybersecurity don’t account for the data shared in digital workspaces. This free, four-minute video explains how to protect that data without crimping collaboration. Watch, Keeping Data SecureRead… Read more »

Why Zero Trust? Why Now?

In this video, we will step you through this journey to zero trust, from establishing some guiding principles to cultivating a zero trust culture. Watch, Why Zero Trust? Why Now?, now: Brought to you by:

All Aboard! 6 Stops on the Journey to Better Security

There’s no getting around it: Malicious cyber actors see state and local agencies as prime targets – both because they manage so much sensitive information and because they often and because they generally don’t have enough cyber resources. But don’t give up hope! In this video, we will review six tactics that can help yourRead… Read more »

Embracing the Zero Trust Framework

Today’s network operations no longer follow the old rules where everything that was enclosed within the network boundaries was assumed to be trustworthy and only external connections were suspect. This video will provide agencies with a framework that they can use to help them develop a comprehensive zero trust approach. Start the video: Brought toRead… Read more »

How to Maintain Security in a Fast-Paced DevOps Environment

DevOps is rapidly changing how agencies develop, test and deliver applications. It’s widely understood that security must be part of the development. But what’s often overlooked is that the development environment itself also must be secure. This course explains how agencies can leverage the Common Access Card/Personal Identification Verification card to create a multi-factor authentication-based… Read more »

Federal Ransomware: A Rising Threat

This 10-minute online course contains three self-paced lessons: Lesson 1: The Risk of Ransomware [2:22] Lesson 2: Federal Fears About Ransomware [2:04] Lesson 3: Repelling and Recovering From Ransomware [3:27] If you haven’t heard of ransomware yet, you will. Ransomware is more than just malicious software – it’s a dangerous cyberthreat that can cost yourRead… Read more »

The Evolution of Identity Proofing

Identity fraud can be particularly difficult to manage. A consumer’s physical or digital identity can be used for employment fraud, benefits fraud, tax return fraud, and more. Along with the negative effects that fraud can have on the immediate victim, taxpayer dollars go to waste and government programs see diminished results. Unfortunately, there is aRead… Read more »

How to Secure the Software Development Lifecycle

The rapid rise in government applications has created significant benefits to the public sector. But while software applications are transforming the face of government, they are also expanding government’s technology footprint and, with it, the potential attack surface. To ensure every application at your agency is secure, you must engrain security throughout the software developmentRead… Read more »

How to Become Compliant in Cloud

Cloud computing can offer innumerable benefits to government agencies, but ensuring they are securely implemented and maintained is challenging. However, the cloud offers something that can eliminate many these complexities: automation. Automating the deployment, configuration and monitoring of security can deliver predictable, repeatable, and reliable compliance and security. This course explores how compliance automation canRead… Read more »

Your Steps to Achieve CDM Phase 4

This course examines what comprises CDM Phase 4 and explains how your agency can become prepared to protect its most critical data by walking through three critical steps. Once agencies have walked through these three steps – discovered, categorized and applied governance to their data – they will have achieved the ultimate goal of CDM… Read more »

How to Create a Security Transformation

This course explains how a security fabric, rather one-off platforms or tools, can increase cybersecurity even as agencies innovate. In three lessons, we explain the risks of digital transformation and discuss the components of a more robust security transformation. Finally, we define a security fabric and examine how it can transform agency operations and innovation.

The Continuous Diagnostics and Mitigation Program

Welcome to the GovLoop Academy course on Continuous Diagnostics and Mitigation, a Department of Homeland Security program that provides government agencies automated cybersecurity capabilities to defend against today’s advanced threats. According to DHS, the CDM program helps to “identify cybersecurity risks on an ongoing basis, prioritize these risks based upon potential impacts, and enable cybersecurityRead… Read more »

NSTIC Programs- Fixing Passwords and Reducing Identity Theft

The Identity Ecosystem steering group, which seeks to provide a marketplace with multiple identity providers that issue trusted credentials, has 1100 individuals and 450 companies and federal agencies participating. They chose five organizations to pilot identity solutions. Below are the agencies and what they are doing to reduce cyber crime and identity theft.