Cybersecurity

New Report – Federal Agencies Challenged to Address Insider Threats

Originally published on Federal Blue Print The Information Sharing Environment (ISE) recently issued a report that highlighted how many federal agencies are currently challenged when it comes to dealing with insider threats. Forty four percent of 39 agencies surveyed reported that they had not yet met the minimum standards required for an effective insider threatRead… Read more »

What You Should Know About Cyber Heists

Our resident security expert and a retired Army JAG David Willson, JD, LLM, CISSP, Security+, shared this blog with us on cyber heists. A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials,Read… Read more »

Seven Habits of Highly Secure People

Earlier this year I attended a workshop at AFCEA’s West13 conference lead by Jeff Moulton, principal research associate at the Georgia Tech Research Institute. He shared his “Seven Habits of Highly Secure People.” Moulton pointed out that as humans, we all function in different ways with different habits. “Everyone in this audience goes about theirRead… Read more »

What Really is Continuous Monitoring and Why is it Essential?

Today, nearly all of an agency’s mission-critical functions depend on safe and secure information technology systems. With cyber threats ever evolving and growing at an exponential rate, and increased reliance on technology to deliver core services in government, a robust cyber defense is needed by agencies. Continuous Monitoring is certainly not a new term, butRead… Read more »

The Evolving Needs of the Federal Government to Reduce Cyber Risk

By Stephanie Sullivan, Consultant The National Institute of Standards and Technology (NIST) is developing a framework to reduce cyber risks to critical infrastructure as part of the Executive Order 13636. As part of the development process working groups have been formulated to gather feedback from industry and relevant stakeholders regarding the development of the frameworkRead… Read more »

3 Threats to Keeping Data Secure

In a fast-moving digital world that we are currently living in, our data and information is constantly at risk of being exposed or compromised. For government agencies, maintaining strict governance policies and educating users is essential. Government agencies collect a variety of data on citizens, from the day we are born and throughout our entireRead… Read more »

DOJ’s Technology Needs –Analytics, Information Sharing, Big Data, and More

by Tomas O’Keefe, Senior Analyst The Department of Justice’s response to the Boston Marathon bombings was notable for how quickly the Department and its components, particularly the FBI, identified, tracked, and apprehended the suspects. One of the ways the FBI was able to quickly identify suspects is due to advanced analytics, but another important elementRead… Read more »

How the NSA could get so smart so fast? – Plus the DorobekINSIDER’s 7 Stories

On GovLoop Insights’ DorobekINSIDER: 10 years ago the role of the Chief Information Officer was radically different than it is today. Consider this, in 2013 the federal government will spend more than $80 billion on IT. That’s no easy task. So how do they do it effectively? And is the role going to continue toRead… Read more »

A New Approach to Cybersecurity Across Agencies – the Administration’s Progress Report

This article was originally posted by Dan Chenok on the IBM Center for the Business of Government blog. Last week, the Obama Administration released its latest set of reports on government performance toward achieving many high-priority goals, within and across agencies. As the Center has written previously, public presentation on this topic focuses on outcomesRead… Read more »