Cybersecurity

Giving the Federal Government Visibility and Control

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. These days, getting hacked is not a matter of “if” – it is a matter of “when”. It is therefore increasingly important to have tools that provide visibility into whatRead… Read more »

Top 5 Reasons to Attend the IBM i2 Summit for a Safer Planet

Follow me on Twitter (@OliverClarkMe) for on-site coverage including blog recaps, live-tweeting from sessions, pictures and more! Threats to societies and organizations have never been more numerous or intense. From fraud and cybercrime, criminal and terrorist threats to weather related disasters and infrastructure emergencies, communities, corporations and countries must prepare for threats, accelerate responses andRead… Read more »

Staying Secure with 50 Billion Devices

Conservative estimates predict there will be more than 50 billion devices connected to the internet by 2020. That’s more than one internet enabled device per-person on the planet. “This smart technology is the fastest growing technology in history,” said Peter Romness, Cybersecurity Lead for US Public Sector, Cisco. “But with every additional device comes increased securityRead… Read more »

Automating Security to Create Virtual Trust

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. “Security is all about trust,” said Richard Breakiron, Senior Director of Cyber Solutions of ViON, an information technology enterprise solutions provider. But how do you create that trust in theRead… Read more »

Government Calling? Don’t Get Scammed

If you’ve used the Internet even once in your life, you’re probably familiar with scams. From the more obvious pop-up viruses to the well-disguised phishing emails, scams are an ever-present nuisance in our lives in the digital age. While you have likely encountered fraud attempts online before, what about over the phone? In the wakeRead… Read more »

The Air Force Has a Plan for Testing Cyber Aptitude

Much like the military’s use of the Defense Language Aptitude Battery to test a person’s ability to learn a foreign language, the Air Force is developing an assessment tool to help determine a recruit’s ability to operate in the cyber domain. There are assessments out there today, but the Air Force needs to decide how… Read more »

Crafting Effective Cyber Partnerships, One Agency At a Time

This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. Four years ago, the White House unveiled the Cloud First policy. The White House mandated that agencies must evaluate safe, secure cloud computing options before making any new investments. ItRead… Read more »

But What Is A Medjack?

Internet of Things (IoT) endpoints, any connected or smart device, are woven into almost any fabric of life, including public health and medicine. For example, IoT can be an implanted device such as pacemakers, insulin pumps, or cochlear ear implants. IoT is also an x-ray, MRI, blood gas analyzer, or Electronic Medical Records (EMR). These areRead… Read more »

The Aftermath of the OPM Hack

When news first broke of the OPM hack back in June, few understood the massive scale of the attack. Originally thought to have affected 4 million federal employees, estimates quickly rose to over 22 million impacted. Since that time, government agencies have scrambled to shore up their cyberdefenses and OPM has worked to provide identityRead… Read more »