Cybersecurity

General Alexander’s Strategy for Effective Cybersecurity

Today, I’m attending Microsoft’s Federal Executive Forum 2015. The day is focused on applying technology solutions to many government challenges, particularly in the area of cybersecurity. But before we dove into the devices, systems, and solutions available to agencies, we heard from General Keith Alexander, former Commander of US Cyber Command, Director of the National Security AgencyRead… Read more »

Security in the New IP – What’s Missing from Government’s Security Wish List?

There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when. According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personalRead… Read more »

Automating your Identity and Access Management System

The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »

Finding the Right Balance to Credential Agency Users

The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »

3 Reasons to Care About Defense Budgets

Home security and personal security are subjects everyone can relate to, and safely assumed to share the same level of importance to most people. While we might not conscientiously put thought into foiling a burglary or assault, we do in fact take steps to enable successful prevention of crime…we take steps to protect ourselves. As… Read more »

A Call To Arms For Cybersecurity

Think back over the recent history of high-profile cyberattacks. Target, Sony, CENTCOM, celebrity nude photos, to name a few, but the list goes on. It’s starting to seem like every time we open our news portals, there’s word of yet another breach in cybersecurity. Chris Dorobek, host of the podcast DorobekINSIDER, recently interviewed a leadingRead… Read more »

It’s Time for Your Security Health Check

If you were feeling a little unsettled about possibly missing a list of “all-things cybersecurity products” offered on GovLoop’s “From Framework to Action: Understanding the NIST Cybersecurity Framework” online training yesterday, I’m here to tell you that it may be time for your security posture check-up. “The idea of security being a certification or aRead… Read more »