Posts Tagged: cybersecurity

Creating an Adaptive Cybersecurity Strategy & Culture through Agile Cybersecurity Action Planning (ACAP)

Cybersecurity should not about just building better castles, but looking ahead to the emerging threats. Castles were undone by introduction of cannons and mobile warfare. This will likely be true of Cybersecurity because the “cyber barbarians,” whether state or non-state actors, criminals or hacktivists, are constantly looking for new technologies, human weakness, back doors and… Read more »

The Tech Loop: Hot Damn!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, GIS, cybersecurity, big data, and IoT. Cloud A cloud of doubt? According to Gartner, Inc., CIOs remain hesitant to consider cloud computing as a first-line option for IT projects. Most areRead… Read more »

Hillary’s Email Isn’t the Only Email Worry for State

Former Secretary of State Hillary Clinton’s email isn’t the only State Department email to make headlines in the past few months. In 2014, the State Department found themselves in a very difficult situation. State Department emails had been breached, presumably by Russian hackers. “The hackers bedeviled the State Department’s email system for much of theRead… Read more »

Insider Threats: The Stranger Next Door

Cybersecurity dialogues often talk about threats and breaches stemming from hackers, terrorists, and cyber-criminals. However, there are significant threats that come from individuals who are closer than you think – maybe even the person you sit next to at the office. SolarWinds, an IT management software company, recently researched insider threats to the federal government.Read… Read more »

The Tech Loop: Big Data and March Madness

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, IoT, cybersecurity, and big data. Cloud 3, 2, 1. Cloud liftoff. It’s been a little over four years since then-federal CIO Vivek Kundra announced a cloud-first policy as part of theRead… Read more »

The Tech Loop: To Cloud Infinity and Beyond!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include IoT, federal gov, cybersecurity, big data, and cloud.  Internet of Things I support things! Not the most effective campaign mantra, but nonetheless, a bipartisan group of U.S. senators has drafted an InternetRead… Read more »

The 7 Deadly IT Sins

It’s a scary cyber world out there. Threats are becoming more sophisticated, effective, and pervasive everyday. According to a Government Accountability Office report, cyber threats to federal agencies increased 782 percent between 2006 and 2012. What’s more, a Center for Strategic and International Studies study estimated the global cost of cybercrime at over $400 billionRead… Read more »

General Alexander’s Strategy for Effective Cybersecurity

Today, I’m attending Microsoft’s Federal Executive Forum 2015. The day is focused on applying technology solutions to many government challenges, particularly in the area of cybersecurity. But before we dove into the devices, systems, and solutions available to agencies, we heard from General Keith Alexander, former Commander of US Cyber Command, Director of the National Security AgencyRead… Read more »

Automating your Identity and Access Management System

The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »