Beat the Bots: GSA Seeks Input on Fighting Fake Comments
With campaigns of mass and fake comments plaguing public feedback mechanisms for regulatory agencies, GSA seeks public input on potential solutions.
With campaigns of mass and fake comments plaguing public feedback mechanisms for regulatory agencies, GSA seeks public input on potential solutions.
This blog is the second of six upcoming articles from GovLoop about the growing cybersecurity threat known as ransomware.
DevSecOps requires new tools and tactics, as it builds on the cultural changes of DevOps to integrate the work of security teams sooner rather than later.
To keep their data, applications and operations protected, agencies need to execute their security procedures in as close to real time as possible.
The hope now is that agencies won’t have to bend backwards to satisfy TIC. The hope is that TIC will instead be flexible enough for agencies to adopt modern solutions tailored to their needs.
Federal IT departments have long been the gatekeepers of technology. They’ve decided which applications employees could download and what devices could connect to the network. But for many agencies, that changed in recent years.
The bottom line is that today’s cloud-based networks have created an environment far removed from traditional on-premises computing. A new approach that starts with secure code is needed.
Database administrators, cloud computing engineers and cybersecurity experts are among the roles agencies need to fill with skilled professionals who can help defend against internal and external threats.
Agencies should fully understand how to embed information security into IT best practices and amongst all users to protect agency data.
State or local governments can turn to SOC-as-a-service to tap into a deep reserve of cyber expertise and threat intelligence.