Using Social Media to Block Cyberattackers
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.
In the aftermath of a massive security breach and the resignation of its director, the Office of Personnel Management (OPM) has taken 2016 as an opportunity to re-evaluate internal processes and strengthen its cybersecurity defenses. As part of those efforts, OPM appointed Clifton Triplett as Senior Cyber and Information Technology Adviser.
When it comes to defending government systems against sophisticated cyberthreats, the biggest challenge for agencies isn’t a technological one. Even the most secured systems can be infiltrated by hackers who prey on one of the hardest areas for agencies to manage: the workforce.
Now that some of the greatest threats to the United States are from cyberattacks, rethinking your agency’s defense infrastructure is critical
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
We sat down with experts from HHS and FedRAMP to discuss how the cloud security program has evolved, government’s privacy concerns and security challenges.
Is your agency unsure how to approach cybersecurity? Check out these solutions from the private sector that take a holistic approach to securing networks.
Everyday at the Corporation for National and Communication Service (CNCS), Stacy Dawn witnesses first-hand the stakes of government cybersecurity. She drove home how much more we have to do if we’re truly going to secure our information and systems.
Generally, the cost of the Vulnerability Scanners may be out of your budget constraints, but there are many free options available. Here are five free Network Security Vulnerability Scanners.
Right now, determining best practices for harnessing threat intelligence data is a popular topic for government and cybersecurity. But what’s often left out of the discussion is the importance of interoperability and automation along with the ability to share actionable intelligence across a cyber-defensive grid.