Posts Tagged: cybersecurity

The Importance of Integrating Your Cyber Solutions

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and, in the report, we answer 12 of their most pressing cyber questions. Cybersecurity professionals are being challenged like never before. They are operating in a rapidly evolving cyber landscape, whichRead… Read more »

The Confidentiality of Email

If you’re like me you felt the same sense of relief in response to the recent media reports of cybersecurity breaches as you felt the last time you joined a line of rubberneckers creeping past a fender-bender on the other side of the highway. At least it’s not me. Cyber attackers routinely go after internalRead… Read more »

Your Two Keys to Robust Cyber Defense

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges. In the report, we answer 12 of their most pressing cyber questions. In a rapidly expanding cyber landscape, agencies must ensure they have deployed the right IT solutions to spot commonRead… Read more »

5 Public Sector Priorities for the New Year: #1 Strengthen Cybersecurity

Happy New Year everyone…now let’s get down to business. This is the first of a five part series on top priorities for government agencies in calendar year 2015. Please note the issues being addressed in this series are by no means exhaustive. Rather, they reflect a sampling of the many challenges facing government at allRead… Read more »

Playing Capture the Flag in the Digital Age

Sony was recently subject to one of the biggest hacks in history. The breach has led to the release of over 40,000 nonemployees’ Social Security numbers. This includes former employees and actors, dating as far back as 1984. This was in addition to the 6,500 current identities lost — and the hackers obtained several unreleasedRead… Read more »

Hacking the Hacker

Cybersecurity is an ever-evolving field. Attackers are constantly changing their strategies and methods of hacking, and it’s a never-ending race for cybersecurity experts to keep up and keep data safe. We explored some of these cyber challenges in GovLoop’s new guide, 30 Innovations that Mattered in 2014. In the guide we talked with Intel SecurityRead… Read more »

Watch Your Back: How to Prevent Insider Threats

Edward Snowden. Robert Hanssen. Bradley Manning. Aldrich Ames. At one point, these people were all part of workforces that organizations depended on. But an organization’s backbone can soon become its biggest vulnerability. With insider threat costs ranging from $5,000 to $3 million per incident, how can your agency address the potentially devastating impact of anRead… Read more »

Technology Trendsetters Busting Through Risk Aversion

In the fast-paced world of technology, government often is the ham in the sandwich – one slice of bread is technological innovation and the other is budget restrictions and risk aversion. Finding balance between these opposing drives is an uphill battle, but many government agencies continue to step up to the challenge. 2014 marked anotherRead… Read more »

Breached, Broached, Broke – Hacked in 2014

Breaches, breaches, breaches everywhere! 2014 will go down in the history books as the year of the mega data breach. Don’t believe me? Take this not-so-fun fact in November the United States Postal Service was breached and more than 2.9 million potential customers were impacted. To put that number in context, in the same yearRead… Read more »

Ho, Ho, Hoax: Tips to Avoid Holiday Cyber Scams

It’s around dawn, and you wake up with excited butterflies in your stomach. This isn’t any normal morning. This is Christmas morning, and you know you definitely landed on Santa’s Nice List this year. Once the realization hits that it’s Christmas Day, the comforter flies off and feet hit the ground running toward the tree.Read… Read more »