Cybersecurity

Cybersecurity and the Missing Workforce

Government increasingly spends more time, money, and effort into strengthening cybersecurity. But is government getting the return on such investments that it should? (ISC)2, the largest not-for profit membership body of certified information and software security professionals worldwide, recently released its seventh Global Information Workforce Study (GISWS) in partnership with Booz Allen Hamilton, Cyber 360Read… Read more »

Creating a Holistic Environment with Multiple Solutions

This interview is an excerpt from GovLoop’s recent guide, The DoD of Tomorrow, which explores how the department is transforming its operations, technology, workforce, and acquisitions process to confront 21st century challenges. The Department of Defense is an incredibly multifaceted organization. To support that complexity, DoD personnel must craft an equally dynamic IT architecture whileRead… Read more »

Preparing Your Agency for Evolving Threats

This interview with Sean Applegate, Director of Technology Strategy & Advanced Solutions at Riverbed Federal, is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Cyberthreats are not static – they constantly evolve to target different vulnerabilities in new ways. Therefore,Read… Read more »

Is Your Website Security at Risk?

OmniStudio is often asked if WordPress sites are more vulnerable to security breaches than other content management platforms. With all websites, even those run by Fortune 500 companies, the threat of hacking is ever present, regardless of the platform it’s built within. Professional website design and development firms who use open source platforms, like WordPress orRead… Read more »

Assuming a Platform Approach to Cybersecurity

This interview with Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. Attackers use a multitude of tactics and applications to penetrate networks today – from sophisticated techniquesRead… Read more »

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »

Is Federal Information Security Better or Worse off Than a Year Ago?

That’s the question (ISC)2, a nonprofit education and certification organization, posed to more than 1,800 federal security professionals for its 2015 global workforce study. Nearly half of those surveyed — 47 percent — said government information security has not improved. A small but growing number of professionals —17 percent — said federal security is worseRead… Read more »

Building Security into Agency Performance

This interview with Gene Stromecki, Federal Sales Specialist, and Dmitriy Ayrapetov, Project Manager at Dell SonicWALL is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The IT landscape is more interconnected and complex than ever before. The increasing number of initiativesRead… Read more »

Get ready for the super federal CIO

More than 20 years ago, then-Sen. William S. Cohen issued an investigative report billed as “Computer Chaos: Billions Wasted on Federal Computer Systems.” That report spurred the Clinger-Cohen Act of 1996, which created the role of agency chief information officers in the hopes of improving how government spends billions of dollars on information technology. InRead… Read more »