Air Force CTO Explains Common Attacks Against Gov and How to Prepare
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
Is your agency unsure how to approach cybersecurity? Check out these solutions from the private sector that take a holistic approach to securing networks.
For years we’ve heard about the cybersecurity skills gap in government, but just how big is it? How many cyber pros are in government and what skills do they lack? We posed these and other questions to the Office of Personnel Management to find out.
The landscape of war is shifting from physical threats to cyber ones. Fortunately, Government Acquisitions is helping the DoD and other agencies identify, target and eliminate these new threats.
DoD is working on solutions for a number of challenges that they are certain to encounter in the years to come. Implementing these changes will be difficult and may take a long time, but adapting to today’s obstacles will not be impossible.
By now everyone knows that cybersecurity is a top issue among government agencies. Every day, there are new threats. Complicating matters: cyber criminals are getting smarter and are employing more sophisticated tactics when it comes to breaching security measures.
You may think your critical data and assets are protected by network intrusion detection systems, firewalls and the latest technology. However, it’s become increasingly clear this is not enough when cyber fraudsters impersonate real people for criminal purposes. In particular, there’s a shift toward the use of stolen identities online due to the availability ofRead… Read more »
We know a lot of agencies are having a hard time developing and implementing effective cybersecurity strategies. Learn the benefits of taking a data centric approach to systems security and how your agency can adopt this strategy.
Having a “Band-Aid” approach to your IT environment is no longer an option for government in today’s reality.
End-to-end network security is necessary to keep an agencies’ data secure and is critical in countering cyberthreats. Learn how the DoD is adopting the architectural approach to cybersecurity with the help of Cisco.