TSP Board to Develop Best Cybersecurity and Risk Management Procedures
The TSP Board is working hard to ensure that cyber attacks and risk factors are totally removed. It’s taking inspiration from the private sector too.
The TSP Board is working hard to ensure that cyber attacks and risk factors are totally removed. It’s taking inspiration from the private sector too.
Learn how to tackle insider threats.
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
I want to kick off this series by looking back at the Into Dangerous Hands story, which aired during the CBS news program “60 Minutes”. In this segment, Scott Pelley reported on now-identified lapses in the process that grants U.S. Government security clearances, particularly profiling the cases of three people – Edward Snowden, Bradley ManningRead… Read more »
Learn why state and local law enforcement agencies and public healthcare facilities remain vulnerable to ransomware attacks.
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
In an interview with GovLoop, Jordan shared his experiences as Arlington County’s CISO and insights on needed improvements in the state and local cyber workforce.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
Learn how to organize your content so that it remains secure.