Think of SecOps as a management approach that bridges the gap to connect security and operations teams, in much the same way that DevOps unifies software developers and operations professionals.
Posts Tagged: Security
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »
What does it take to protect your agency’s network? Here are the five things you need to in place to avoid becoming the next ransomware casualty.
Three questions to help you decide if the benefits of information sharing outweigh the costs for your business.
Addressing concerns that federal agencies are not taking advantage of innovative cybersecurity offerings, particularly from small businesses and startups.
Did you know that 2015 saw one of the worst government data breaches in history with 21.5 million identities exposed? With such a daunting threat landscape, security becomes everyone’s job.
Federal agencies are under great pressure to optimize infrastructure to better support mission performance and resilience. To do that, the engines that power information processing – the federal datacenters – need to leverage innovation to achieve speed, increase security, density and reduce power consumption.
Today, agencies have every reason to think “Cloud First.” By embracing the cloud and everything it has to offer, they immediately reap the rewards of budget savings, boosted efficiencies and heightened security.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »