Posts Tagged: cybersecurity

Finding the Right Balance to Credential Agency Users

The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »

State Technology: A Case For Less Rules, And More Collaboration

Less rules and more talking. Sounds fun, right? Mitch Herckis, Director of Government Affairs at the National Association of State Chief Information Officers (NASCIO), is a proponent of more communication and less outright bans for government cybersecurity. He recently spoke with Christopher Dorobek, host of the podcast DorobekINSIDER, on cybersecurity regulations on the state governingRead… Read more »

A Call To Arms For Cybersecurity

Think back over the recent history of high-profile cyberattacks. Target, Sony, CENTCOM, celebrity nude photos, to name a few, but the list goes on. It’s starting to seem like every time we open our news portals, there’s word of yet another breach in cybersecurity. Chris Dorobek, host of the podcast DorobekINSIDER, recently interviewed a leadingRead… Read more »

It’s Time for Your Security Health Check

If you were feeling a little unsettled about possibly missing a list of “all-things cybersecurity products” offered on GovLoop’s “From Framework to Action: Understanding the NIST Cybersecurity Framework” online training yesterday, I’m here to tell you that it may be time for your security posture check-up. “The idea of security being a certification or aRead… Read more »

How to Protect Your Agency’s Social Media from Hackers

On January 12, a group claiming to be connected to ISIS hacked the Twitter and YouTube accounts of U.S. Central Command, also known as CENTCOM. If the military can be hacked, is your agency’s social media vulnerable to a hacker attack? How can your agency protect itself on social media? The hack of CENTCOM’s socialRead… Read more »

The Importance of Integrating Your Cyber Solutions

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and, in the report, we answer 12 of their most pressing cyber questions. Cybersecurity professionals are being challenged like never before. They are operating in a rapidly evolving cyber landscape, whichRead… Read more »

The Confidentiality of Email

If you’re like me you felt the same sense of relief in response to the recent media reports of cybersecurity breaches as you felt the last time you joined a line of rubberneckers creeping past a fender-bender on the other side of the highway. At least it’s not me. Cyber attackers routinely go after internalRead… Read more »