Posts Tagged: Securing Government

Preparing Your Agency for Evolving Threats

This interview with Sean Applegate, Director of Technology Strategy & Advanced Solutions at Riverbed Federal, is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Cyberthreats are not static – they constantly evolve to target different vulnerabilities in new ways. Therefore,… Read more »

Assuming a Platform Approach to Cybersecurity

This interview with Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Attackers use a multitude of tactics and applications to penetrate networks today – from sophisticated techniques… Read more »

Building Security into Agency Performance

This interview with Gene Stromecki, Federal Sales Specialist, and Dmitriy Ayrapetov, Project Manager at Dell SonicWALL is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The IT landscape is more interconnected and complex than ever before. The increasing number of initiatives… Read more »

Reprioritizing to Enhance Cyber Capabilites

The following post is an interview with Bob Lentz, Member of FireEye’s Board of Directors, President of Cybersecurity Strategies, and former Deputy Assistant Secretary of Defense for Cyber, Information, and Identity Assurance. It is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines.  Though government spending on cybersecurity continues to increase, many… Read more »

Your Cybersecurity Cheat Sheet

Unless you have an advanced degree in cybersecurity, you might be a little confused by all of the techy lingo used to define the threats to government information. How is an advanced persistent threat different from a regular threat? Is phishing what your dad makes you do on camping trips? Isn’t a troll just a mythical… Read more »

Supporting Insider Threat Identification with Continuous Monitoring

The following interview with Chris LaPoint, Group Vice President of Product Management at SolarWinds, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The risk of insider threats isn’t anything new – recent breaches like WikiLeaks and Edward Snowden’s… Read more »

Crafting Holistic Insider Threat Protection

The following interview with Prem Jadhwani, Chief Technology Officer of Government Acquisitions, Inc, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. In addition to risking national security, insider threats are a serious vulnerability to intellectual property and classified information…. Read more »

The Cybersecurity Landscape of Government

Cybersecurity is one of the most talked about topics in government these days. That’s great, because it means we are finally focusing efforts on collecting massive amounts of data on the threat, impact, and response of cyber efforts. Nevertheless, the deluge of information being generated about cyberthreats and government security tactics can be overwhelming. What… Read more »

Protecting Networks with Next Generation Firewalls

The following interview with Ken Karsten, Vice President of Federal Sales at Intel Security, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Front Lines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Because government serves citizens, agencies cannot achieve their missions without opening their secure networks to… Read more »