What’s Your Government IT IQ?
Take this short quiz to find out.
Take this short quiz to find out.
Have you ever wished for a crystal ball that would magically show you the future? What would you do with that knowledge? We can’t promise you a crystal ball, but Alec Ross, former Senior Advisor for Innovation to Secretary of State Hillary Clinton and current Fellow at Johns Hopkins University, is releasing his book, IndustriesRead… Read more »
This post was written by Karen Terrell, Vice President, SAS Federal According to the Identity Theft Resource Center, there have been 57 data breaches of government and military agencies in 2015, putting at risk nearly 40 million records. Unfortunately, the attacks will continue to happen, growing in frequency, severity and impact unless agencies employRead… Read more »
In the wake of the devastating OPM data breach, the Obama administration is gradually shifting investigation duties to a new entity that will be supported by the Defense Department.
Simply put, existing network infrastructure was never designed to meet the missions, challenges or cyber threats of today.
This interview is an excerpt from our recent research guide, “Continuous Diagnostics and Mitigation (CDM) and Einstein: The Foundations of Federal Civilian Cyberdefense.” To download the complete guide, click here. Continuous Diagnostics and Mitigation (CDM) requires constant monitoring to ensure government IT departments strengthen the security of their cyber networks. When the general public thinksRead… Read more »
This interview is an excerpt from our recent guide, 30 Government Innovations That Mattered in 2015 which examines 30 government case studies that explore innovation at all levels of government. Innovations that spanned the government job spectrum from human resources to cybersecurity and back again. For more than 30 years laser and ink jet printers have populatedRead… Read more »
The recent spending legislative bill passed by the congress though has expanded the ID theft protection for all the employees that were affected by the data breach.
Securing your unified communications (UC) infrastructure is one area of security that is often overlooked in favor of network and data security.
Cybersecurity has gone from a niche IT issue to a boardroom priority and Cross-Agency-Priority (CAP) for business and government organizations.