Cybersecurity

How DHS is Creating the Future of Cybersecurity

With constant news about breaches detected and how government is managing the fallout from them, it seems like we are in a reactive state of cybersecurity today. Will that always be the case? If not, what does the future of government cybersecurity look like? At our event, Evolving Tactics to Combat the Cyber Threat, MarkRead… Read more »

Interagency Approach to Cybersecurity

At Tuesday’s GovLoop event, “Evolving Tactics to Combat the Cyber Threat,” govies kicked off the day by focusing on a critical strategy to better tackle cyber threats: interagency collaboration. Michael Garcia is the Acting Director of the National Strategy for Trusted Identities in Cyberspace (NSTIC) at the National Institute for Standards and Technology (NIST) underRead… Read more »

Are You Overlooking Print Security?

In today’s connected world, cybersecurity is far more than keeping malicious applications off your smartphone or thwarting attacks before they wreak havoc on your computer systems. It seems just about anything can — and is — being connected to the Internet these days, and with that increased level of connectivity comes an increased level ofRead… Read more »

The Three Steps to Securing Your Data

It is more important than ever for government agencies to get on board with protecting the data they are entrusted with. Unfortunately, this is a classic example of a task that’s easier said than done. Combined with the speed at which we share data and the increasing amount of data being stored, it is becomingRead… Read more »

How Employees In ‘Mission-Critical Occupations’ View Federal Work

IT specialists are among the most sought after professionals in the federal government, yet they do not give the government high ratings when it comes to recruiting, retaining or training them.

Securing the Perimeter Before A Cyber Attack

“There are two kinds of CIOs: ones who have been hacked and know it, and those that have been hacked and don’t realize it yet. But the reality is, you’ve been hacked.” This is a startling statement from Tony Scott, the CIO of the Office of Management and Budget, that emphasizes the massive cyberthreat toRead… Read more »

Safeguarding against Shadow IT

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Increasingly, consumers want to bring their own technology solutions and devices into the workplace. However, “shadow IT” – unauthorized devices used within the workplace without the knowledge of the ITRead… Read more »

Strategic Federal Human Capital Management – Security

With security threats facing virtually every federal institution, the vulnerability of federal agencies is top of mind of our federal government leaders. The threats are exacerbated due to the fact that many government agencies use older, legacy systems that were not designed to resist today’s threats. These systems not only increase vulnerability to computer attacks,… Read more »