The Race to Cybersecurity & the Privacy v. Security Debate
How far is too far when it comes to protecting sensitive data from possible or perceived cyberthreats?
How far is too far when it comes to protecting sensitive data from possible or perceived cyberthreats?
In a recent interview, Anthony Lauro, Senior Enterprise Security Architect at Akamai, a content delivery network and cloud computing services provider, shared how organizations can build new, more effective cybersecurity strategies to combat growing threats.
It’s hard to imagine that just a few years ago Cook County, Ill., – the second most populous county in the country – had no centralized management strategy or directive for its various agencies’ IT security protocols and tools. Today, the county has both a central security office within its Department of Homeland Security and… Read more »
All about continuous evaluation and security in government.
How to manage various compliance standards and keep your data safe.
The TSP Board is working hard to ensure that cyber attacks and risk factors are totally removed. It’s taking inspiration from the private sector too.
Learn how to tackle insider threats.
I need your help in getting the Department of Commerce, Department of Labor and the GSA to authorize the creation of new NAICS, SIC, and GSA SIN procurement codes for cybersecurity products and services.
I want to kick off this series by looking back at the Into Dangerous Hands story, which aired during the CBS news program “60 Minutes”. In this segment, Scott Pelley reported on now-identified lapses in the process that grants U.S. Government security clearances, particularly profiling the cases of three people – Edward Snowden, Bradley ManningRead… Read more »
Learn why state and local law enforcement agencies and public healthcare facilities remain vulnerable to ransomware attacks.