Cybersecurity

The 4 A’s Government Needs to Protect Your Privacy

“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »

Hacking into SCADA

Fortunately, for many years, the water and wastewater industry did not experience too many breaches on the digital front. But a few years back, the Stuxnet virus showed up and our digital innocence was shattered. When this happened, I was somewhat surprised because of the lack of previous attacks, but I never really heard howRead… Read more »

Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security

Please join in the discussion! GTRA Technology Council Meeting – Government IT Security Collaboration June 22 – 24, 2014 The Lansdowne, Leesburg, VA http://govtechcouncil.org/index.php/council-meeting/june-2014 Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe inRead… Read more »

12 Tips on Mobile Security from 2 Senior Executives in Government

In our most recent resource entitled, “Agency of the Future: Guide to Mobile Security in Government” (you can download it here), I had the chance to interview two senior leaders in government: Rick Holgate, chief information officer at the Bureau of Alcohol, Tobacco, Firearms and Explosives. Bradley Nix, chief information security officer at the DepartmentRead… Read more »

Huffington Post Interview With Xerox’s Chuck Brooks

http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-in_2_b_4620232.html?utm_source=Alert-blogger&utm_medium=email&utm_campaign=Email%2BNotifications www.huffingtonpost.com/brian-e-finch/”,”background_color”:”#cccccc”,”font”:”lucida grande”,”layout”:”button_count”,”author_nickname”:”hp_blogger_Brian E. Finch”,”entity_type”:”1″,”entity_id”:320489,”hp_track”:”Author Info”,”vertical_id”:0}”> Cybersecurity Industry Interview With Xerox’s Chuck Brooks by Brian Finch, Partner, Dickstein Shapiro, LLP As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. I spoke with Vice President and Client Executive at Xerox, ChuckRead… Read more »

What’s the Biggest Threat to Your Agency When You Use Your Smartphone or Tablet?

Last week, GovLoop launched its “Agency of the Future: Guide to Mobile Security in Government”, which you can download here. The guide is packed with fascinating insights from a survey of 255 government employees, including a breakdown of which mobile devices employees use, their ability to download apps on those devices and the degree toRead… Read more »

Healthcare.gov to Undergo Network Security Test

The Department of Health and Human Services will test the federal health insurance marketplace website for network security in a simulated cybersecurity attack, Nextgov reported Monday. Aliya Sternstein writes hospitals, insurers and the HHS will try to communicate and share data with the government during the simulation test. Kevin Charest, HHS chief information security officer,Read… Read more »

Federal Cybersecurity Trends in 2014

2013 proved to be an eye-opening year when it came to cybersecurity. The NSA data breach shined a light on how virtually any organization is vulnerable to insider threats, and that achieving cybersecurity goals can be highly challenging. Next year, the rise of mobile device consumerization will continue to provide both security challenges and opportunities.Read… Read more »

Thwarting Cyber Threats with Advanced Secure KVM and KM Technology

One of the most under-utilized preventative measures for thwarting cyber attacks is KVM (keyboard/video/mouse) switching devices. These devices allow employees in any type of business to securely switch between networks with various security levels from one desktop location. Advanced Secure KVM Switches offer superior security and data cyber threat protection by providing true data pathRead… Read more »

Trend Tracking – 5 things to be on the lookout for in 2014

2013 is rapidly coming to a close, so it is time to look forward and take bets on what’s on the docket for the next 365 days. In our newest guide: 20 Innovations that Mattered in 2014, we peered into our crystal ball and made our forecast of the five biggest trends for next year.Read… Read more »