3 Best Practices for Improved Network Security
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
The first FITARA scorecards were released earlier this month by the House Oversight and Government Reform Committee’s Subcommittee on Information Technology, and the results weren’t great.
From forging a unity of effort in homeland security to strategizing today how to field the U.S. Army of tomorrow; to pursuing affordable housing, eliminating fraud, waste, and abuse in healthcare, and securing cyberspace, our most recent issue of The Business of Government magazine delves into a diverse set of topics and public management issuesRead… Read more »
Just a few years ago, the only security metric that mattered was whether your organization had been hacked or not. This all-or-nothing definition of security success is now outdated. There are new, more complex metrics that measure the strength of your security posture.
Last year more than 20 million government employees, contractors and their families were hacked. The Office of Personnel Management is now trying to fix some of their cybersecurity gaps during a six-week cyber sprint led by Federal Chief Information Officer Tony Scott. In this month’s DorobekINSIDER Live, “Cybersecurity: Lessons From the OPM Hack,” Chris DorobekRead… Read more »
Follow me on Twitter (@OliverClarkMe) for on-site coverage including blog recaps, live-tweeting from sessions, pictures and more! Threats to societies and organizations have never been more numerous or intense. From fraud and cybercrime, criminal and terrorist threats to weather related disasters and infrastructure emergencies, communities, corporations and countries must prepare for threats, accelerate responses andRead… Read more »
Conservative estimates predict there will be more than 50 billion devices connected to the internet by 2020. That’s more than one internet enabled device per-person on the planet. “This smart technology is the fastest growing technology in history,” said Peter Romness, Cybersecurity Lead for US Public Sector, Cisco. “But with every additional device comes increased securityRead… Read more »
Throughout the second quarter of 2015, the Center for Internet Security’s Multi-State Information Sharing and Analysis Center (MS-ISAC) noted a significant increase in the number of account compromises impacting state, local, tribal and territorial (SLTT) governments. What can you do to help minimize these account compromises?
If you’ve used the Internet even once in your life, you’re probably familiar with scams. From the more obvious pop-up viruses to the well-disguised phishing emails, scams are an ever-present nuisance in our lives in the digital age. While you have likely encountered fraud attempts online before, what about over the phone? In the wakeRead… Read more »
When news first broke of the OPM hack back in June, few understood the massive scale of the attack. Originally thought to have affected 4 million federal employees, estimates quickly rose to over 22 million impacted. Since that time, government agencies have scrambled to shore up their cyberdefenses and OPM has worked to provide identityRead… Read more »