Cybersecurity

Reprioritizing to Enhance Cyber Capabilites

The following post is an interview with Bob Lentz, Member of FireEye’s Board of Directors, President of Cybersecurity Strategies, and former Deputy Assistant Secretary of Defense for Cyber, Information, and Identity Assurance. It is an excerpt from GovLoop’s recent guide, Securing Government: Lessons from the Cyber Frontlines.  Though government spending on cybersecurity continues to increase, manyRead… Read more »

Schlepping Through Cybersecurity Hiring

For cybersecurity workforce hiring in state governments, it’s hurdle upon hurdle. The challenges keep emerging, and states have to constantly keep up with the difficult terrain. The National Association of State Chief Information Officers (NASCIO) recently released a study on the challenges facing state government IT workforces. The report highlights findings from survey data collectedRead… Read more »

Your Cybersecurity Cheat Sheet

Unless you have an advanced degree in cybersecurity, you might be a little confused by all of the techy lingo used to define the threats to government information. How is an advanced persistent threat different from a regular threat? Is phishing what your dad makes you do on camping trips? Isn’t a troll just a mythicalRead… Read more »

“No One Patches A Light Bulb”

57% attendees at our webinar, Staying Secure and Connected: The Power of IoE, on Thursday said they didn’t know the different between the Internet of Things and the Internet of Everything. This isn’t surprising. I didn’t completely know the difference, but now I do. Our speakers Tom Millar, Chief of Communications at the US Computer EmergencyRead… Read more »

It’s Not A Popularity Contest… Or Is It?

The government is faced with a conundrum. It’s unpopular and unattractive for emerging cybersecurity professionals. Unfortunately, the government has been the subject of many recent hacks. On top of this, federal agencies have a great deal of information and services that hackers want to gain access to. So, the government needs more and better cybersecurityRead… Read more »

Supporting Insider Threat Identification with Continuous Monitoring

The following interview with Chris LaPoint, Group Vice President of Product Management at SolarWinds, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. The risk of insider threats isn’t anything new – recent breaches like WikiLeaks and Edward Snowden’sRead… Read more »

Continuous Monitoring Must Include Continuous Sharing

It’s hard to manage what you don’t measure. We’ve all heard the saying in various contexts, but this is especially true on the cyber front. In fiscal 2014, agencies reported spending $3.8 billion to monitor federal networks for internal and external malicious cyber activity and another $3.1 billion to detect, analyze and mitigate intrusions, accordingRead… Read more »

Cyber Trends & Strategies You Need To Know

Cybersecurity is an inescapable and urgent priority for everyone. No matter what sector you’re in or what device you’re using, securing your information and network is critical. To help keep you in the cyber loop, GovLoop’s 4th Annual Government Innovators Virtual Summit hosted the session: Cybersecurity Trends and Strategies You Need To Know. During thisRead… Read more »

Join GovLoop’s Government Innovators Virtual Summit — Today!

GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us today, April 22nd, from 10:00AM/7AM PT to 5PM/2PM PT to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make senseRead… Read more »

Crafting Holistic Insider Threat Protection

The following interview with Prem Jadhwani, Chief Technology Officer of Government Acquisitions, Inc, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. In addition to risking national security, insider threats are a serious vulnerability to intellectual property and classified information.Read… Read more »