In this age of rapid technological innovation, organizations face many obstacles to ensuring cybersecurity. The rise of internet-connected devices is just one thing that’s forced agencies to rethink in 2018 how they secure technologies and their related endpoints that operate on their networks.
Posts Tagged: cybersecurity
With today’s headlines abuzz with news about hackers, security breaches, and an unlimited array of online threats, it’s no wonder that achieving a solid network security posture has become a little like the quest for the Holy Grail.
Older hardware and software assets are favorite targets of cybersecurity threats looking to gain entry into systems holding sensitive information. They also are difficult and expensive to maintain.
Some governments, like the state of Michigan, have worked to overcome cybersecurity challenges with novel and cost-effective solutions.
One perk of the MGT Act that's often touted is the $500 million fund it would create, but some IT leaders say the real value will come from newly created working capital funds at each agency.
At Smart Cyber, Symantec's 14th Government Symposium, we heard from Jeanette Manfra, Assistant Secretary in the Office of Cybersecurity and Communications at the Department of Homeland Security (DHS). She explained how DHS is attempting to achieve that balance between challenge and opportunity.
As organizations and citizen users increasingly depend on websites, mobile computing and web-based applications, they become exposed to greater privacy and security risks. Because of the open infrastructure of the Internet and the growing availability of hacking tools, almost anyone can carry out a cyberattack against any organization or user relying on networked applications and... Read more »
The first-of-its-kind hiring fair brought together more than 1,800 job seekers from 40 states, and hiring managers from 33 federal agencies. The ultimate goal is to fill 500 IT and cybersecurity positions governmentwide.
Automation tools like Red Hat’s Ansible — an open source IT configuration management, deployment and orchestration tool — can help agencies turn their security posture from reactive to proactive.
At GovLoop’s Gov Trends Virtual Summit, we heard from Nadav Benbarak, Director of Industry Solutions at Okta, and John Harrington, CSRA's Chief Architect supporting the Office of the CIO. They explained how identity and access management (IAM) can play a central role in every technology strategy agencies must embrace to modernize.