This report will look at how to develop a plan that is capable of supporting and protecting the business of government with a holistic approach to zero trust. Download your report, Making Zero Trust Actionable: Key Ways to Accelerate Your Journey now: Brought to you by:
To manage risks like cyberthreats, agencies’ data strategies must involve people, processes and technology working together when disaster strikes. How can agencies address so many concerns simultaneously? The answer is a continuity of operations (COOP) plan covering data defense, recovery and risk management. Explore how the cloud fits agencies’ COOP considerations and can help minimizeRead… Read more »
This free report will help you learn more about how agencies can navigate the security challenges of modern applications and focus on securing resources from the inside.
This report will help you achieve cloud and zero trust synchronization. Download your resource, How Zero Trust Can Solve the Cloud Security Riddle now: Brought to you by:
Learn how agencies can improve their cybersecurity with network switches with our new report. Download your report, The Link Between Government Cybersecurity and Supply Chains, now: Brought to you by:
This report will discuss the drivers, challenges and best practices of implementing zero trust principles. Download your report, Mapping the Journey to Zero Trust Security now: Brought to you by:
This report explores a cloud-native solution and offers best practices for ensuring data is fully protected. Download your report, Four Best Practices for Protecting Data Wherever it Exists now: Brought to you by:
This report will present thoughts from federal leaders, best practices for strong cybersecurity and a case study to help you build and maintain a secure enterprise. Download your report, Rethinking Federal Cybersecurity, now: Brought to you by:
Learn how your agency can monitor cyberthreats, improve incident response and build greater cybersecurity resilience. Download your report, 5 Steps Toward Cybersecurity Resilience for Government Agencies, now: Brought to you by:
Learn how a comprehensive data protection strategy can help agencies defend valuable data. Download your report, Protecting Data at All Cost, now: Brought to you by:
Learn how agencies are embracing security as a driver for continuity.
Learn how to support multiple work styles with cybersecurity best practices for you and your agency.
Learn how your agency can effectively manage and secure a hybrid environment.
Explore best practices for creating and maintaining a strong security foundation.
This report will examine how network visibility can enable zero trust security for agencies’ hybrid cloud environments.
This report will discuss how government agencies can use visibility and monitoring tools to neutralize security threats that arise when integrating OT with IT and IoT networks.
Find out how anonymized threat information can stop threats early.
Check out this new report to learn more about how agencies can leverage AI to make dramatic gains in cybersecurity.
Improve your cyber defenses.
Get your free copy of this new report to explore recent GovLoop survey results about how federal agencies are accelerating and simplifying FedRAMP compliance and how industry partners can help.
Get your free copy of this new report to learn how agencies can reduce risk associated with inadequate supply chain security.
Get your free copy of this event booklet to learn how agencies are moving beyond old security models to safely and efficiently support distributed workforces.
Download your free copy and learn how Zero Trust can help agencies achieve the security objectives of TIC 3.0.
Learn how your agency can implement a modern, comprehensive anti-phishing strategy.
Get your free copy of this new report to learn more about current network security challenges and how agencies are addressing them.
Learn how agencies can block attacks to applications and prevent breaches by investing in technology solutions and approaches that can address this critical problem.
This new report will explain why backup, recovery and disaster recovery are challenging for agencies and best practices to overcome them.
Explore this new report to learn the importance of developing a cohesive strategy to protect your agency’s data and the best ways to accomplish the task.
Get your free copy of this new report to learn how the Defense Department (DoD) implemented a working DevSecOps culture and how your agency can do the same.
Learn how to plan for and manage the increasingly complex cloud security environment.
Double down on data protection.
Check out this new report to learn how to improve IT security at your organization and take a look at how two large federal agencies were able to do so.
Learn how to weave security into every step of software development.
Learn how security operation centers (SOCs)-as-a-service can help strengthen your agency’s cybersecurity.
Agencies need to be able to gauge performance everywhere, at all times, across a complex web of legacy, mobile, cloud and shadow IT components. But agencies struggle with real-time end-to-end visibility into pain points and areas of underperformance. This means it can be difficult to quickly detect, diagnose and defeat problems before they impede productivity.Read… Read more »
Learn why automation is critical for state and local governments and how you can implement it to stay secure.
Download this new report to learn how Unisys Stealth®, a Zero Trust software suite that uses identity-based micro-segmentation to transform your existing network — both on-premises and in the cloud, can transform your agency into a zero trust network.
Government mandates like Cloud Smart and security requirements like the Federal Risk and Authorization Management Program (FedRAMP) are driving agencies toward cloud adoption. Cloud adoption does not come without risks, however. Shared responsibility, lack of visibility, internal risks, advanced cyberattacks and more are at play for agencies that move their sensitive data and applications toRead… Read more »
This report addresses the network modernization challenges agencies face today and why software-defined wide area networks are critical to addressing them
The internet consists of more than just searchable content. Search engines such as Google and Bing merely skim the surface of the internet and index what they find. The content that remains unindexed is part of the deep web, and further into the layers of the internet is the dark web, which consists of intentionallyRead… Read more »
All of the flashy press makes moving to the cloud seem simple, but as agencies know, there’s a lot more that goes on behind the scenes.
SDSN is an approach that incorporates, unifies and automates security throughout the network to defend against today’s sophisticated threat landscape.
Agencies need a way to enable mobile, multiplatform workflows that are still secure – and today, data loss prevention falls short.
Cyberattacks are rising. In 2017, federal agencies reported 35,277 cybersecurity incidents for their IT systems. The government today realizes it is in a cyberwar and must defend its agencies from attackers. One of the main reasons systems are vulnerable is that they are either not patched or not patched quickly enough. Systems continue to beRead… Read more »
Strong data management requires robust identity governance, meaning agencies need to know the identities of those users accessing their networks and data.
The common trait insider threats have is their access to an agency’s internal data, IT infrastructures and security practices.
Cyberattacks are a serious threat to our economy and national security. Government agencies need to be able to detect, defend and respond to threats immediately, and quickly bounce back from cyber incidents, whether they are the result of an accident, natural disaster or malicious attack. Often, after defending, detecting and responding to an attack, recoveryRead… Read more »
In a 2009 survey of federal employees, the Government Accountability Office found that an average of $440.4 million was spent on unnecessary printing each year. Despite its astronomical cost, little effort was made to reduce this financial burden, even as government agencies found themselves needing to do more with less. But the growing prioritization ofRead… Read more »
We asked 100 public-sector employees who are involved in finance and IT about their agency’s ability to accurately track cybersecurity spending.
Agency IT and security operations teams must rethink how they protect data in a digital world where data is everywhere, particularly when data is in the cloud. Federal agencies should take a chapter from financial institutions’ playbooks and adopt a data-centric approach that includes data encryption, tokenization and key management that protects data across allRead… Read more »
In this report, we look at how agencies deal with critical cyberattacks, where they succeed and the challenges they face.
Most federal employees think their agencies are safe from insider threats – but they’re wrong. A 2017 Meritalk survey found that 42 percent of federal cybersecurity professionals said that their agencies were the target of cyber incidents perpetrated by insiders. The U.S. Computer Emergency Readiness Team (US-CERT) defines insider threats as any “current or formerRead… Read more »
Check out this new report to explore the results of a recent GovLoop survey of gov employees on the usage, perception and outcomes of the CSF and specifically its Detect function.
Learn more about the NIST Cybersecurity Framework’s Protect function and how your agency can better secure your most-high value assets.
GovLoop partnered with network security company Force 3 to examine and define the current challenges agencies face when securing their networks.
When the National Institute of Standards and Technology partnered with other federal agencies and the private sector to develop the first iteration of the NIST Cybersecurity Framework (CSF), the focus was on protecting our nation’s most critical assets. The primary audience was entities that own and operate critical infrastructure vital to our public safety andRead… Read more »
In this industry perspective, created in partnership with HPE, Chip Charitat, Senior Solutions Architect at HPE Data Security, explains that encrypting data-at-rest is a minimum standard of care for protecting sensitive data, and that effective encryption requires secure enterprise key management practices with automated policy enforcement that can scale with the enterprise.
In the following pages we’ll discuss how agencies must manage access controls and IT vulnerabilities while complying with all security regulations.
Encryption is an essential tool that federal agencies must employ to protect their networks and both the transient and maintained data on said networks.
Check out this report to learn how DoD and other government agencies are dealing with evolving threats using an automated approach that’s built on analytics.
In this industry perspective, GovLoop partnered with OSIsoft to learn more about the PI System and how it’s helped their government partners deliver greater operational improvements and breakthroughs that ultimately lead to comprehensive enterprise transformation.
In this industry perspective, GovLoop has partnered with Merlin International, NetApp and HyTrust to share the value of secure converged infrastructures in government.
In this industry perspective, GovLoop, HPE and TSPi partnered to discuss the current state of application security in government, the importance of FedRAMP and how it has allowed U.S. agencies leverage the Fortify on Demand service to increase their agility and reduce cyberrisk and costs.
Learn what cognitive computing is, how it works and how you can leverage entity-centric analytics to be more proactive in preventing insider threats.
In this industry perspective, we’ll explore how to create those appropriate policies, processes and tools with the help of a trusted solutions provider. We’ll explain why agencies are currently struggling to counter advanced attacks, how they can learn from their environment and what they need to evolve their defenses. Finally, we’ll investigate how operationalized security… Read more »
Private companies, organizations and even the federal government spend billions every year on various forms of perimeter security. Between firewalls, IPS/IDS devices, endpoint detection solutions, sandboxing, direct security information and event management (SIEM) monitoring and traditional antivirus and antimalware installations, most organizations seem to be bristling with protections that should make them secure – atRead… Read more »
Learn how government agencies are using the NIST Cybersecurity Framework, where areas of improvement can be made and how to continue cyber education and best practices in government.
Federal networks become increasingly complex as they evolve to support critical internal missions and the delivery of citizen services. At the same time, they face a continuous barrage of probes and attacks from increasingly sophisticated adversaries. To protect complex networks in the face of these threats, federal cybersecurity is evolving beyond periodic assessment of staticRead… Read more »
Cybersecurity is everyone’s priority. Looking ahead to 2017, nothing is changing about that. While government is getting better at addressing cyberthreats, there are remaining challenges. This research brief will outline those challenges and solutions for government to strengthen its cyber posture.
Complexity and a lack of strategic planning undermine our government’s cybersecurity. The government does have the ability to protect our data and IT resources; what is needed is a strategic, risk-based program that prioritizes its most valuable assets.
Bill Bacci, Federal Director of Data Security at HPE, explained why government agencies need a comprehensive approach to enterprise data protection in a recent interview with GovLoop. He also shared how data security technologies can help agencies achieve end-to-end data-centric security without compromising functionality.
There are few constants when it comes to federal cybersecurity. Agencies are bombarded daily with evolving cyber attacks against their sensitive data and systems. They also face a never-ending battle to secure consumer devices that employees are connecting to their networks. Although agencies can’t control the sophistication and frequency of attacks, they can take stepsRead… Read more »
When the Federal Risk and Authorization Management Program (FedRAMP) launched in 2012, cloud computing was a fairly new business model in government. Few agencies were buying IT services and they were struggling to grasp the logistics of cloud procurement, implementation and security. Fast-forward to the present. Virtually every Cabinet-level agency, including the Defense Department, isRead… Read more »
In this industry perspective, GovLoop and Splunk look at how government organizations can bridge the gap between IT operations and security to better meet agency mission and serve citizens.
Managing the balance between security and system performance is a high stakes battleground that operations and security teams must navigate carefully. Building consensus between these groups can be challenging, with one team focused strictly on security, while the other wants to ensure uptime and high performance for existing or new services. These competing priorities andRead… Read more »
The printer should be included in your agency’s overall security policy and compliance.
As government relies more heavily on information technology to store, manage and access critical data, it also creates greater potential for that information to be misused or exposed. Data clearly shows that internal threats and external hackers are taking advantage of those vulnerabilities. To help safeguard this ever-expanding attack surface, public key infrastructures, or PKI, have become a standardRead… Read more »
This Industry Perspective will assess these challenges and offer insights into how existing solutions and technologies can help agencies address advanced persistent threats effectively.
Replacing outdated infrastructure with modern secure technology not only reduces security risks but also improves efficiency, productivity and service delivery in our digitized world.
In this report, we explain how your organization can better enable cyber staff through training, testing employee skill sets and utilizing intelligence with data and analytics to make smarter decisions and respond appropriately to cyberthreats.
Check out this new report to learn how proper authentications can help keep your systems secure and your employees productive.
There are few issues more pressing in government today than cybersecurity. The stakes have become increasingly high as hackers routinely exploit known and unknown computer vulnerabilities and infiltrate government networks to steal sensitive data and cause harm. With that in mind, what options do agencies have when it comes to detecting and defending against theseRead… Read more »
Better understand the changing needs of government printing, how to overcome current challenges in the field and more with this new research brief.
Agency leaders must proactively assess their networks for intrusions and be ready with an effective incident response plan if a breach is detected.
Gone are the days when cybersecurity was just an information technology problem. In 2015 alone, eBay, LivingSocial, Adobe, Evernote, Home Depot and JPMorgan Chase joined the ever-growing list of companies facing major security breaches. And it’s not just about compromised data: The breaches also amount to millions, if not billions, of dollars in lost revenue,Read… Read more »
The recent breach of Office of Personnel Management data affected 22 million records, but its ramifications are, in fact, even more far-reaching than that. Media coverage of the event ensured that many more people worldwide are aware of the U.S. government’s cybersecurity shortcomings and those people are demanding a swift response. It’s in this veryRead… Read more »
In 2015 so far, the number of people affected by U.S. government cyberattacks has reached an all-time high. From the OPM breach to lesser-known attacks, cybersecurity is rightfully a massive concern for government officials. Although many cybersecurity conversations have centered on online vulnerabilities, few have adequately addressed the physical threat that individuals with privileged access present. Undoubtedly, the public sector would benefitRead… Read more »
Cyberthreats present serious, ever increasing risks to federal agencies. An April 2014 Government Accountability Office report notes that federal agencies reported 64,214 information security incidents to the U.S. Computer Emergency Response Team (US-CERT) in 2013, a 104 percent increase from 2009. Government has responded through legislation, executive orders, and cross-agency priority (CAP) goals that putRead… Read more »
Recent highly publicized security breaches have recently brought insider threats into the eye of the mainstream. But federal government employees already know that insider threats are an ever-present hazard to government security and operations. To learn how agencies can minimize the risk of insider threats without further burdening their overstretched agencies, GovLoop sat down with Patricia Larsen,Read… Read more »
Cybersecurity is the hottest buzzword in government these days. But just because people are talking about it, doesn’t mean they actually know how to achieve it. In reality, many government organizations are struggling to secure their data from internal and external threats. Taken alone, cybersecurity is challenging. The speed of evolution and the consistency ofRead… Read more »
To become more resilient against cyberthreats, agencies must improve visibility and understand events happening on their networks. With increased awareness, organizations will see operational benefits and save employees valuable time, improving productivity and morale. To achieve these benefits, agencies need to deploy the right kind of infrastructure. They must look to a platform approach andRead… Read more »
In our interconnected and highly-globalized world, agencies must deploy emerging technology to improve service delivery and connect employees to data anywhere, anytime. But as trends like cloud, virtualization, telework and mobile continue to gain traction in government, cybersecurity cannot be an afterthought: it’s mission critical. And now, more than ever before, mitigating the impacts ofRead… Read more »
The rampant increase in cyberattacks, mounting regulatory requirements, and the constant concern over insider threats mean that securing your agency’s resources is more important than ever. Yet at the same time, agencies face budgetary constraints, staff shortages, and a host of conflicting priorities that result in basic security protocols—things like ensuring users have appropriate accessRead… Read more »
Given the mounting threat of cyber attacks coupled with a proliferation of information now accessible online, multilayered identity management systems are more important than ever to any agency’s security infrastructure. Fortunately, most organizations understand the necessity to protect online information by creating stringent verification processes for users. Simply ensuring that the right person is accessingRead… Read more »
The world of cybersecurity is immense. The jargon surrounding the subject is nearly as varied. Here are a few examples: There’s malware, damage, espionage, regulation, education, viruses, advanced persistent threats, partners, reputation insider threats – and that’s just a small sample. Adding to this complexity is a common disconnect between technology experts within the organization,Read… Read more »
Cyber threats are rising rapidly and government needs an alternative, secure solution to the present operating environment where multiple machines are required for multiple types of information. This Industry Perspective explains the robust, unparalleled advantages of SecureView, a low-cost, MILS (Multiple Independent Levels of Security) workstation with accredited cross-domain security developed in close collaboration between… Read more »