Cybersecurity

How Can You Combat Insider Threats?

The following blog post is an excerpt from a recent GovLoop guide: Your Cybersecurity Crash Course. We solicited the GovLoop community to learn their top cyber challenges and the report, we answer 12 of their most pressing cyber questions. Insider threats can have severe consequences, with victim organizations facing significant costs and damages. According to the FBI, the averageRead… Read more »

Enabling an Integrated IT Environment From the Foxhole to the Cubicle

The following is an excerpt from the GovLoop Guide, The Joint Information Environment: The IT Framework for the Future. You can access the full report here, in which we describe the JIE and impact it is making at the Department of Defense.  The Joint Information Environment (JIE), once deployed, will have far-reaching impacts on the wayRead… Read more »

Preparing for Phase 2 of the CDM Program

Government information networks have become more interconnected and diverse than ever before. As such, risks for cyberattacks have increased. To help civilian agencies detect, mitigate and mediate attacks, DHS has established the Continuous Diagnostic and Mitigation (CDM) program, which will enable government officials to gain increased visibility of their networks, and improve their cybersecurity postureRead… Read more »

3 Best Practices for Securing Confidential Data

With organizations creating more documents and data by the minute, it’s essential now more than ever before that agencies look at how to protect all of their information. That’s why many agency leaders are now exploring Data Loss Prevention (DLP) solutions. DLP helps organizations discover, monitor, protect and manage information, particularly sensitive data, wherever itRead… Read more »

23 Cybersecurity Facts and Figures

You’ve probably heard a lot about the mounting threat of cyberattacks and the need for government organizations to safeguard their information environment against them. Recent events like the USIS breach only amplify anxiety over cybersecurity. But is all this hype really merited? You may be questioning whether the threat of cybersecurity is overinflated or fleeting. Well, we’re hereRead… Read more »

Tactics of the Ideal Cyber Workforce

With constant emerging technologies and our increasing dependence on electronic devices, cybersecurity affects everyone. Whether it is highly confidential data that you handle at your workplace or your personal banking information, you probably have some form of electronic information that you’d like to keep private and secure. We all need cybersecurity knowledge. For cyber professionals,Read… Read more »

Capture the Flag: Cybersecurity Training Edition

In our closing keynote session at the Cyber Playbook event, Ann Barron-DiCamillo, Director, U.S. Computer Emergency Readiness Team (US-CERT), Department of Homeland Security, shared some insights of her work at US-CERT and the importance of training the cyber workforce. In her role, Ann Barron-DiCamillo serves as the lead for DHS’s response to major cybersecurity incidents,Read… Read more »

Cyber Huddle: Hail Mary’s, Audibles & Sticking with the Run

Sprinkler systems. Elevators. CO2 monitoring. What do they all have in common? They are systems that can all be digitally accessed in modern buildings. They can also all be breached. In a world where digital thermostats can be compromised and reworked into spying microphones, how can public agencies possibly stay ahead of cyber security threats? AtRead… Read more »