Cybersecurity

2015 – A Year In Connected Security

This interview is an excerpt from our recent guide, 30 Government Innovations That Mattered in 2015 which examines 30 government case studies that explore innovation at all levels of government. Innovations that spanned the government job spectrum from human resources to cybersecurity and back again. The largest cyber breach in the his­tory of government sawRead… Read more »

From A-Z – Security Made Whole

“Cybersecurity isn’t just an issue for leaders in the “big boy seats, but rather, for everyone using the Internet,” said Peter Singer, author of  Cybersecurity and Cyberwar: What Everyone Needs to Know and a Brookings Fellow. Gone are the days when cybersecurity was just an information technology problem. In 2015 alone, eBay, LivingSocial, Adobe, Evernote,Read… Read more »

How to Prepare for the 2016 Presidential Transition

National security is always a priority for any administration. And this year cybersecurity was the primary agenda item. But it won’t stop at the end of 2015. The new President-elect will have to hit the ground running when it comes to addressing national security. In order to tackle the security question, it is crucial that government workRead… Read more »

Don’t Get Caught Biting Cybercriminal’s Bait

Cybersecurity is one of the most serious economic and national security challenges we face as a nation. And even though cybersecurity is a top priority for government organizations, security professionals still face multiple challenges defending themselves. “Strong security requires attention to people, process, and technology,” said Elayne Starkey, Chief Security Officer for the State ofRead… Read more »

Six Steps to Achieving Cyber Resilience

Even though cybersecurity has been one of the most talked about topics in 2015, cyber professionals still face many challenges combating criminals. For government agencies at all levels, there’s a dire need for the right talent and capabilities to actively defend against cyberthreats. And with developing technologies in cloud, the Internet of Things, social networking,Read… Read more »

The 3 Pillars to Improving Cyber Resilience

The volume, velocity, and aggressiveness of cyberattackers continue to increase. It’s not a matter of “if” an organization will be attacked — it’s a matter of “when.” And because of this reality, it’s imperative that organizations become more active in defending against attackers. So how do you increase your ability to detect, verify, and respondRead… Read more »