Posts Tagged: cyber

What Does it Mean to Be Secure?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions.   Maintaining and protecting valuable assets are two of government’s most important tasks. Your agency may very well hold crucialRead… Read more »

The Anatomy of a “Sniper” Hack

In war, there is quite a difference between the crude methods of indiscriminate destruction of weapons of mass destruction and a well trained sniper on a well-funded, precisely planned mission. WMDs leave mess everywhere, make it clear to everyone something big happened and are more about fear than accomplishing specific goals. In cyber war, theRead… Read more »

The Continuous Diagnostic and Mitigation (CDM) Program Field Guide [New Report]

Government needs to become more agile and efficient in the way it combats cyberthreats. Explore our latest guide on the Continuous Diagnostic and Mitigation (CDM) program to learn how. In today’s world, it’s imperative that government protects our critical infrastructure to preserve our physical and economic security. To do so, cyber professionals must obtain real-timeRead… Read more »

Staying Secure by Protecting Your Data

One of the most pressing challenges facing government agencies is the ability to guard against cyberattacks. GovLoop’s recent cybersecurity event covered the some of the findings from our recent GovLoop report, and connected industry and public sector professionals to collaborate and share best practices to improve government’s security. During the industry panel, Andy Bonillo, DirectorRead… Read more »

Cybersecurity: Experts’ Concerns — and Advice

At GovLoop’s latest live event on cybersecurity, a panel of experts gathered to discuss the myriad challenges that the government and organizations face when it comes to being prepared for cyberattacks. But it wasn’t all doom and gloom — each participant also offered up concrete tips on what you can do today to start creatingRead… Read more »

How being TACIT Can Help Your Cybersecurity Efforts

Cybersecurity has emerged as a key priority for information technology leaders. From the top levels of government, pressures are increasing to protect U.S. critical infrastructure and collaborate across sectors. But being secure isn’t just about thwarting attacks – it’s also about being prepared to react once you fall victim to a cyberattack. Dealing with cybersecurityRead… Read more »

Step-by-Step Guide to Getting Started With Security Governance

Article Posted on behalf of Vo Ballard of Cask, LLC. – If the word ‘governance’ sounds like a high level concept that is only applicable to high level managers, chances are you may be missing the cornerstone of a framework that guides and directs the why and how your organization conducts business. If you thinkRead… Read more »

Thwarting Cyber Threats with Advanced Secure KVM and KM Technology

One of the most under-utilized preventative measures for thwarting cyber attacks is KVM (keyboard/video/mouse) switching devices. These devices allow employees in any type of business to securely switch between networks with various security levels from one desktop location. Advanced Secure KVM Switches offer superior security and data cyber threat protection by providing true data pathRead… Read more »