How the NSA Addresses Cybersecurity Challenges
Cybersecurity has become a risk management contest, and NSA must especially consider it; anything digitally operated is part of the modern battlefield.
Cybersecurity has become a risk management contest, and NSA must especially consider it; anything digitally operated is part of the modern battlefield.
Compliance automation is a new approach to achieve and maintain compliance. It uses code to automate the implementation, validation, remediation, monitoring and reporting of an agency’s security. It allows agencies to quickly deploy audit-ready environments that are pre-configured to meet compliance requirement
While commonly associated with cryptocurrencies, the security and information management capabilities of blockchain extend far beyond payment methods.
In 2017, hackers accessed the personal data of nearly half of the U.S. population. The data was taken from Equifax, a CRA.
Organizations that have multiple clouds have larger, more complex networks with larger attack surfaces that need defending from cyberthreats.
The Defense Department took steps toward overhauling antiquated software acquisition processes and moving toward a modern software-based IT strategy.
If one thing is constant in the IT world, it’s change. Technology and procedures are often changing for the better in government, which improves processes and services that citizens can then use to improve their lives.
Trump’s fiscal 2020 budget lists a slight increase for federal cybersecurity spending, and a minor drop in federal IT spending.
Agencies should adopt a layered security approach that combines access, identity and security event management to detect and disrupt insider threats before damage is done.
GAO released the 2019 High Risk List for this year. The report has led to savings of nearly $350 billion over the past 13 years, according to GAO.