Cybersecurity

CDM: Where Cybersecurity Meets Big Data

This interview is an excerpt from our recent research guide, “Continuous Diagnostics and Mitigation (CDM) and Einstein: The Foundations of Federal Civilian Cyberdefense.” To download the complete guide, click here. Continuous Diagnostics and Mitigation (CDM) requires constant monitoring to ensure government IT departments strengthen the security of their cyber networks. When the general public thinksRead… Read more »

Printing – The Next Frontier of Cybersecurity

This interview is an excerpt from our recent guide, 30 Government Innovations That Mattered in 2015 which examines 30 government case studies that explore innovation at all levels of government. Innovations that spanned the government job spectrum from human resources to cybersecurity and back again. For more than 30 years laser and ink jet printers have populatedRead… Read more »

The Sweet Spot of Continuous Monitoring

This interview is an excerpt from our recent research guide, “Continuous Diagnostics and Mitigation (CDM) and Einstein: The Foundations of Federal Civilian Cyberdefense.” To download the complete guide, click here. As cybersecurity has evolved into an arms race between hackers and protectors, continuous monitoring has quickly replaced periodic security posture assessments. But according to MarkRead… Read more »

Securing While Innovating – Not Easy, But Totally Possible!

This interview is an excerpt from our recent guide, 30 Government Innovations That Mattered in 2015 which examines 30 government case studies that explore innovation at all levels of government. Innovations that spanned the government job spectrum from human resources to cybersecurity and back again. The ease of online services and digital resources are perks that citizensRead… Read more »

Addressing the Critical Issue of Printer Security

This interview is an excerpt from our recent research guide, “Continuous Diagnostics and Mitigation (CDM) and Einstein: The Foundations of Federal Civilian Cyberdefense.” To download the complete guide, click here. Continuous monitoring (CM) enables agencies to constantly assess their IT security risk posture from all levels of the organization. It provides current security and complianceRead… Read more »