Cybersecurity: Infrastructure to Web Applications
Having a “Band-Aid” approach to your IT environment is no longer an option for government in today’s reality.
Having a “Band-Aid” approach to your IT environment is no longer an option for government in today’s reality.
End-to-end network security is necessary to keep an agencies’ data secure and is critical in countering cyberthreats. Learn how the DoD is adopting the architectural approach to cybersecurity with the help of Cisco.
Not many organizations have stringent printing policies, and most do not see much reason to change that. The main reason that many agencies don’t have strong measures for securing their printers? There is a gaping lack of education surrounding printers, as well as a number of misconceptions.
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
As government relies more heavily on information technology to store, manage and access critical data, it also creates greater potential for that information to be misused or exposed. According to one Government Accountability Office report, the number of cyber incidents in the federal space in 2014 was 12 times higher than it was in 2006.
Creating a vision of health care technology that can support the health of all Americans in smart and efficient ways is no easy task. Though much progress has been made across the health IT market, several challenges still remain – everything from dealing with cybersecurity and interoperability issues to health care modernization and more.
Federal networks and systems today are under unrelenting attack by persistent, sophisticated and resourceful adversaries who operate on behalf of nation states or criminal groups with the aim of stealing sensitive data, causing harm or exploiting federal and military systems.
Particularly at the state and local levels, the number of cybersecurity-related jobs already outnumbers people qualified to fill them, and that demand is growing rapidly. To counter that shortage, some organizations are creating new strategies to organize and recruit cyber professionals.
The legacy infrastructure supporting IT functions has often been resilient. And to its credit, it often demands little attention, allowing for a level of complacency. But with this complacency comes risk.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »