National Defense, Cybersecurity and the Tech Industry
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
As government relies more heavily on information technology to store, manage and access critical data, it also creates greater potential for that information to be misused or exposed. According to one Government Accountability Office report, the number of cyber incidents in the federal space in 2014 was 12 times higher than it was in 2006.
Creating a vision of health care technology that can support the health of all Americans in smart and efficient ways is no easy task. Though much progress has been made across the health IT market, several challenges still remain – everything from dealing with cybersecurity and interoperability issues to health care modernization and more.
Federal networks and systems today are under unrelenting attack by persistent, sophisticated and resourceful adversaries who operate on behalf of nation states or criminal groups with the aim of stealing sensitive data, causing harm or exploiting federal and military systems.
Particularly at the state and local levels, the number of cybersecurity-related jobs already outnumbers people qualified to fill them, and that demand is growing rapidly. To counter that shortage, some organizations are creating new strategies to organize and recruit cyber professionals.
The legacy infrastructure supporting IT functions has often been resilient. And to its credit, it often demands little attention, allowing for a level of complacency. But with this complacency comes risk.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »
The proliferation of access points has added to the problem of keeping information safe. Now data is being accessed from remote work centers and employees’ homes or positions in the field, plus mobile devices and more. Here are four main access points to watch out for.
Phishing attacks, advanced malware, and ransomware are just a few of the types of cyberattacks that government deals with in today’s current cyberthreat landscape. In an attempt to counter such attacks, many agencies focus on tool-based strategies as cyberthreats come. But the problem with such approaches is that agencies are usually ill equipped to apply… Read more »
Read about how you can help address human error to improve your cybersecurity.