Culture as a Risk Control: Embedding Trust and Security into Team DNA
Your best firewall might be sitting two cubicles down. Here’s how to make cybersecurity everyone’s business.
Your best firewall might be sitting two cubicles down. Here’s how to make cybersecurity everyone’s business.
Application security is imperative in all phases of your agency’s software lifecycle, from design to deployment. That means you must continue to find new and better ways to embed security testing to reduce the risk of cyberattacks and protect your organization’s data. Recently, a rash of high-profile cyberattacks has exploited weaknesses in the elements usedRead… Read more »
In this recent video interview, Paul Gomez of Security Information Systems discusses what modernized security monitoring entails and the benefits it offers.
As AI transforms how we serve and secure, public-sector leaders must navigate the tricky space where machine intelligence meets cyber risk.
Insider threats have always been with us, but new technologies, including AI, have made it easier for network users to access and expose sensitive data.
With mobile threats evolving rapidly, securing your work phone is no longer optional—it’s the frontline defense for government data.
In this video interview, Jared Vichengrad, of Check Point Software Technologies, discusses how agencies can take a more comprehensive approach to endpoint security.
To evolve from security to resilience, agencies need to develop a data-centric architecture that aligns with the full data lifecycle.
A new, holistic approach to cyber risk management is needed, so federal agencies can build a more secure digital future and better achieve their missions. That includes zero-trust principles, cloud security, and deep understanding of data risk.
From the principle of least privilege to the concept of zero trust security, the modern cyber ecosystem is built around identity. But how do you know if an identity has been compromised?
Notifications