Discovering Data in Today’s Government
This blog is an excerpt from GovLoop’s recent industry perspective, Discovering Data in Today’s Government.
This blog is an excerpt from GovLoop’s recent industry perspective, Discovering Data in Today’s Government.
Protecting privileged accounts is an important part of any agency cybersecurity strategy because these accounts have access to a lot of sensitive information in organizations. Hear how Rod Simmons recommends agencies prevent external threats from compromising these accounts.
Learn how to create a secure space to roam the internet at your agency.
To understand how agencies can better tackle potential insider threats, we heard from Jay White, Director of the Security Services Division for the Mississippi Dept. of Information Technology Services, and David Geick, Director of IT Security Services DAS/BEST for the state of Connecticut. They suggested four tactics for increasing agency security from intentional or malicious… Read more »
Current cybersecurity solutions only provide security at the perimeter. Learn how VMware NSX can help your agency secure internal networks and servers to better detect, prevent and respond to cyberattacks.
One of the biggest divides I have noticed since I entered government service eight years ago is the one between people who have kids and people who don’t.
Cybersecurity is embedded in government. It affects the way the average employee logs into their computer, accesses email, and even uses the internet. However, many employees are still behind in the cyber arena. So what security trainings should employees know about? What is good basic cyber hygiene for the workforce? And how should agencies explore… Read more »
Assistive technology can enrich your life as well as often helping you remain living independently in the community. There are many types of A.T. items designed to make life easier that cover a wide range of disabilities.
Do you need some good career advice? Check out these pieces from across the public and private sectors.
This blog post is an excerpt from GovLoop’s recent guide, “Government Health IT: The Fight to Keep Public-Sector Data Secure.”