Which Cyberthreats Really Matter?
The things you need to know about improving SecOps at your agency.
The things you need to know about improving SecOps at your agency.
This blog post is an excerpt from GovLoop’s recent guide, “Government Health IT: The Fight to Keep Public-Sector Data Secure.”
Insider threats are some of the most pernicious risks to government and can do grave damage to national security. Using tools that better spot suspicious human behavior can help. Learn what cognitive computing is, how it works and how you can leverage entity-centric analytics to be more proactive in preventing insider threats.
Protecting privileged accounts is an important part of any agency cybersecurity strategy because these accounts have access to a lot of sensitive information in organizations. Hear how Rod Simmons recommends agencies prevent external threats from compromising these accounts.
Learn how to create a secure space to roam the internet at your agency.
To understand how agencies can better tackle potential insider threats, we heard from Jay White, Director of the Security Services Division for the Mississippi Dept. of Information Technology Services, and David Geick, Director of IT Security Services DAS/BEST for the state of Connecticut. They suggested four tactics for increasing agency security from intentional or malicious… Read more »
Current cybersecurity solutions only provide security at the perimeter. Learn how VMware NSX can help your agency secure internal networks and servers to better detect, prevent and respond to cyberattacks.
Cybersecurity is embedded in government. It affects the way the average employee logs into their computer, accesses email, and even uses the internet. However, many employees are still behind in the cyber arena. So what security trainings should employees know about? What is good basic cyber hygiene for the workforce? And how should agencies explore… Read more »
This blog post is an excerpt from GovLoop’s recent guide, “Government Health IT: The Fight to Keep Public-Sector Data Secure.”
Because many agencies rely on tools that don’t meet current needs, the first step to operationalizing security is actually not to start implementing changes for the future. Instead, take the time to assess the current threat landscape of your agency related directly to your mission and its associated important assets, as well as the tools… Read more »