Why Prevention Still Matters
A dangerous precedent is emerging, one that preaches the idea that because security measures aren’t foolproof and cyberattacks will happen, it’s more important to focus on reaction than prevention.
A dangerous precedent is emerging, one that preaches the idea that because security measures aren’t foolproof and cyberattacks will happen, it’s more important to focus on reaction than prevention.
There is no shortage of information on the interwebs about the massive Office of Personnel and Management breach that left computer systems and data exposed to hackers. The hard part is cutting through the jargon and speculation to understand what happened and what this hack means for you, especially if you’re one of the 4Read… Read more »
More than 20 years ago, then-Sen. William S. Cohen issued an investigative report billed as “Computer Chaos: Billions Wasted on Federal Computer Systems.” That report spurred the Clinger-Cohen Act of 1996, which created the role of agency chief information officers in the hopes of improving how government spends billions of dollars on information technology. InRead… Read more »
It’s hard to manage what you don’t measure. We’ve all heard the saying in various contexts, but this is especially true on the cyber front. In fiscal 2014, agencies reported spending $3.8 billion to monitor federal networks for internal and external malicious cyber activity and another $3.1 billion to detect, analyze and mitigate intrusions, accordingRead… Read more »
When you hear about a cyber breach, you probably wonder if your credit card has been compromised. But that’s it. Unless you are in the security field, a cyberattack can often feel like someone else’s problem. And that feeling is true in the government as well. Don’t believe it? Check this out: cybersecurity policies areRead… Read more »
Former Secretary of State Hillary Clinton’s email isn’t the only State Department email to make headlines in the past few months. In 2014, the State Department found themselves in a very difficult situation. State Department emails had been breached, presumably by Russian hackers. “The hackers bedeviled the State Department’s email system for much of theRead… Read more »
The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, GIS, gov IT market, and cybersecurity. Cloud I can see China from my cloud. Last week, the House Armed Services committee held a hearing on the DoD’s IT investments, worried thatRead… Read more »
The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cybersecurity, Internet of Things, net neutrality, and cloud. Cybersecurity Per usual, cybersecurity is the talk of the town at all levels of government. The White House is officially launching its cyber agency,Read… Read more »
The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and, in the report, we answer 12 of their most pressing cyber questions. Cybersecurity professionals are being challenged like never before. They are operating in a rapidly evolving cyber landscape, whichRead… Read more »
Sony was recently subject to one of the biggest hacks in history. The breach has led to the release of over 40,000 nonemployees’ Social Security numbers. This includes former employees and actors, dating as far back as 1984. This was in addition to the 6,500 current identities lost — and the hackers obtained several unreleasedRead… Read more »