Moving Toward a Holistic Cybersecurity Experience
To understand the best ways to secure agency networks, GovLoop spoke with Will Ash, Senior Director of U.S. Public Sector Security at Cisco, an industry leader in networking and cybersecurity.
To understand the best ways to secure agency networks, GovLoop spoke with Will Ash, Senior Director of U.S. Public Sector Security at Cisco, an industry leader in networking and cybersecurity.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. Agencies continue to rapidly implement new security monitoring tools with the goal of identifying actions impacting security within each layer of their environment. This growth of management and monitoring tools has negatively impacted systems and application performance due to theRead… Read more »
Perhaps its time to consider a new approach that puts people at the center, or human-centered design (HCD).
California is the king of innovation, from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it’s not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
According to Scott Carlson of BeyondTrust, a privileged access management and vulnerability management solutions provider, these federal initiatives fall short of truly protecting government IT from credential misuse.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
In the aftermath of a massive security breach and the resignation of its director, the Office of Personnel Management (OPM) has taken 2016 as an opportunity to re-evaluate internal processes and strengthen its cybersecurity defenses. As part of those efforts, OPM appointed Clifton Triplett as Senior Cyber and Information Technology Adviser.
When it comes to defending government systems against sophisticated cyberthreats, the biggest challenge for agencies isn’t a technological one. Even the most secured systems can be infiltrated by hackers who prey on one of the hardest areas for agencies to manage: the workforce.
Now that some of the greatest threats to the United States are from cyberattacks, rethinking your agency’s defense infrastructure is critical
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.