Cybersecurity

The Zero Trust Framework

The following is an excerpt from our recent research brief, Zero Trust: The Security Network Infrastructure of Tomorrow. To read more, download the full report here. Today, in order to protect a network, security teams rely on several different security instruments to keep data secure. These could range from web application firewalls (WAFs), content-filtering gateways orRead… Read more »

Insider Threats: The Stranger Next Door

Cybersecurity dialogues often talk about threats and breaches stemming from hackers, terrorists, and cyber-criminals. However, there are significant threats that come from individuals who are closer than you think – maybe even the person you sit next to at the office. SolarWinds, an IT management software company, recently researched insider threats to the federal government.Read… Read more »

The 7 Deadly IT Sins

It’s a scary cyber world out there. Threats are becoming more sophisticated, effective, and pervasive everyday. According to a Government Accountability Office report, cyber threats to federal agencies increased 782 percent between 2006 and 2012. What’s more, a Center for Strategic and International Studies study estimated the global cost of cybercrime at over $400 billionRead… Read more »

General Alexander’s Strategy for Effective Cybersecurity

Today, I’m attending Microsoft’s Federal Executive Forum 2015. The day is focused on applying technology solutions to many government challenges, particularly in the area of cybersecurity. But before we dove into the devices, systems, and solutions available to agencies, we heard from General Keith Alexander, former Commander of US Cyber Command, Director of the National Security AgencyRead… Read more »

Security in the New IP – What’s Missing from Government’s Security Wish List?

There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when. According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personalRead… Read more »

Automating your Identity and Access Management System

The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »

Finding the Right Balance to Credential Agency Users

The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »

3 Reasons to Care About Defense Budgets

Home security and personal security are subjects everyone can relate to, and safely assumed to share the same level of importance to most people. While we might not conscientiously put thought into foiling a burglary or assault, we do in fact take steps to enable successful prevention of crime…we take steps to protect ourselves. As… Read more »