Explore the zero-trust paradox in a way that centers you, not tools or foreign concepts that everyday employees can’t grasp. Download your guide, Why Zero Trust Matters at Work (and How to Foster It) now: Sponsored by:
America has a cybersecurity problem, and recent events suggest it is worsening. In 2021 alone, cybercriminals have upended everything from gas pipelines to schools. This spotlight resource strives to address the cybersecurity fatigue gov employees are feeling by refreshing cybersecurity for agencies. Our practical resource tackles four elements from the EO so that you andRead… Read more »
Explore what cybersecurity looks like today and where it will probably be headed tomorrow.
In this guide, you’ll learn cybersecurity definitions, best practices and crucial answers in an interactive manner.
Get your free copy of this spotlight resource on collaboration and cybersecurity to learn practical tips you can take back to your agency.
In this new guide, Agencies Raise Their Cyber Intelligence, you’ll learn how to measure your agency’s cybersecurity progress.
In this guide, you’ll learn how FedRAMP, CDM and TIC 3.0 are providing agencies with a roadmap for strengthening security.
Download our new guide to learn how to balance modernization and security to keep IT supply chains safe.
Learn what an enterprise approach to risk management looks like today and why it’s necessary to support government’s digital future.
Artificial intelligence (AI) and machine learning (ML) are the way forward as the amount of data continues to grow alongside the shifting threat landscape.
In many ways, how we secure, manage and verify our digital identities have become as important — if not more important — than how we represent ourselves in person. Our privacy, security and sensitive assets are at stake and are more accessible to us, and to those who wish to harm us. For government agencies,Read… Read more »
Today, in the collaborative framework of DevOps, security is a shared responsibility integrated from end to end. It’s a mindset that is so important, it has led to the term and approach, DevSecOps, which emphasizes the need to build a security foundation into DevOps initiatives. DevSecOps means thinking about application and infrastructure security from the start.Read… Read more »
This guide explains the role that procurement, security and workforces play in cloud adoption while debunking some of the myths about the technology.
A zero trust approach to cybersecurity offers agencies a strategy for detecting and mitigating cyberthreats from both inside and outside their networks.
This guide explains today’s cyberthreats, what motivates attackers, the damage they can cause and best practices for keeping your organization safe.
More than 150 agencies are using FedRAMP-authorized cloud services. Through FedRAMP and its more than 120 authorized products, agencies are able to leverage existing authorizations and work off of a common set of security standards, which allows them to consider more options when migrating to the cloud. This process not only improves access to innovativeRead… Read more »
There’s a lot of talk in government about modernizing aging systems and adopting digital services to give citizens the same type of experience they’re used to getting from private companies. But none of these initiatives can stand on its own without a solid cybersecurity strategy. Underpinning each effort is a major push to improve howRead… Read more »
Cybersecurity is now part of everyone’s job description. This playbook will help your agency enable every employee — from frontline staff to the top administrator — to safeguard government.
It’s probably safe to assume that most of us have heard the old “practice makes perfect” adage at least once in our lives. The formula is simple: work hard, work often and you’ll dominate — eventually. We bought into this concept. We believed, we did, we conquered — or at least tried to. But thenRead… Read more »
Check out this new pocket guide to learn everything you need to know about analytics-driven security in government.
Government agencies are barraged with more than 10,000 cyberthreats every day. Not only do agencies need equipped cyber professionals to manage and counter these threats, they also need IT operations professionals to ensure systems are at peak performance. At the same time, not every threat is critical and not every threat needs to be managedRead… Read more »
In this guide, we will take an indepth look at seven ways government agencies are taking cybersecurity efforts to the next level using innovations in artificial intelligence, analytics, training, bug reporting, partnerships across borders, procurement, and recruitment and retention.
Use these six personas to help equip the most important component behind cybersecurity posture: humans.
In this guide, we will take an in-depth look at the challenges and risks associated with health IT, and explore ways that the government is addressing them.
This guide serves as an overview of critical infrastructure in government today – what it is, why it matters, how each sector works, and what you as a government employee need to know about it. We’ve included overviews of the 16 sectors that make up critical infrastructure in government as a whole, and delve into… Read more »
This pocket guide from GovLoop will look at content security practices in the public sector, why it matters, government rules and regulations related to digital data and its security and current challenges in this area. We’ll also provide tips and tricks that you can apply to help make content at your agency more secure today… Read more »
Read about the current state of cybersecurity in government and how government is working to address its most pressing challenges.
This GovLoop guide, in collaboration with Splunk, will explore the challenges facing the public sector and how big data can help solve some of these problems. It will also explain how Splunk can support all public sector agency missions from cybersecurity to compliance and more by leveraging machine data.
This GovLoop guide looks at the current state of government health IT, innovations and how government is driving the adoption of IT in health care
It seems like every time you check the news, you read another alarming headline like “Database leak exposes 191M voter registration records” and “21.5 million exposed in second hack of federal office.” It’s clear that government is fighting a constant war in cyberspace, and it’s occasionally losing. But is that the whole story? What’s oftenRead… Read more »
Every January, the President of the United States makes the 1.5-mile journey from the White House to the Capitol Building to address the three branches of government and the public through the annual State of the Union speech. For more than 200 years, presidents from George Washington to Barack Obama have taken the opportunity toRead… Read more »
Interest in government cybersecurity has never been higher. High-profile leaks by Edward Snowden and Chelsea Manning, coupled with external attacks on entities including the White House, have attracted a spotlight. But after data on 21.5 million federal employees and their families were exposed in the breaches of the Office of Personnel Management’s Information systems, many moreRead… Read more »
Public servants have always been on the frontline of American defense, whether serving in combat positions or conducting analyses at a desk. They have long protected our infrastructure, economy, freedoms, and national interests. In the current age of cyber insecurity, those duties have never been more important. Every employee at every level of government is charged with protecting our information from foreign andRead… Read more »
Many news outlets declared 2014 to be “The Year of the Breach,” especially for government. The title seems appropriate. Last year, the U.S. Postal Service (USPS), the Nuclear Regulatory Commission, the State Department, and even the White House fell victim to successful hacks that resulted in sensitive information being exposed to adversaries and the public.Read… Read more »
In December of 2012 the Department of Defense (DoD) developed the Joint Information Environment (JIE) framework. JIE is an ambitious multi-year effort designed to realign, restructure and modernize the Department’s information technology networks. The JIE framework will change the way DoD networks are constructed, operated and defended. Since JIE is not a program of record,Read… Read more »
In 1988, Robert Tappan Morris became the first person to be convicted under the U.S. Computer Fraud and Abuse Act. Curious about how big the Internet was, Morris wrote a script now known as the “Morris worm.” He never intended to inflict harm to machines, but as the worm replicated and spread throughout the Internet,Read… Read more »
In today’s world, it’s imperative that government protects our critical infrastructure to preserve our physical and economic security. To do so, cyber professionals must obtain real-time visibility of networks, improve ability to mitigate known flaws and decrease security risks by reducing their vulnerabilities. That’s why the CDM program is so important. The program enables agencies to decreaseRead… Read more »
In today’s digital world, no organization is immune from cybersecurity threats. Whether it’s Target, LivingSocial, the Federal Reserve or any other public-facing institution, every organization is at risk of having its data and infrastructure compromised. For security professionals today, being secure isn’t just about thwarting attacks – it’s also being prepared to react once you… Read more »
GovLoop is pleased to produce this most recent guide in its “Agency of the Future” series, this time turning our attention to the important matter of mobile security.
This report provides an overview of the current cybersecurity landscape and the ‘need to know’ cyber information for government professionals.