Tackling Insider Threats
Learn how to tackle insider threats.
Learn how to tackle insider threats.
I want to kick off this series by looking back at the Into Dangerous Hands story, which aired during the CBS news program “60 Minutes”. In this segment, Scott Pelley reported on now-identified lapses in the process that grants U.S. Government security clearances, particularly profiling the cases of three people – Edward Snowden, Bradley ManningRead… Read more »
Learn why state and local law enforcement agencies and public healthcare facilities remain vulnerable to ransomware attacks.
Thursday’s GovLoop webinar covers how agencies can use the Cybersecurity Strategy and Implementation Plan to guide their own security strategies.
In an interview with GovLoop, Jordan shared his experiences as Arlington County’s CISO and insights on needed improvements in the state and local cyber workforce.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwordsRead… Read more »
Learn how to organize your content so that it remains secure.
To keep pace with the frequency and sophistication of evolving cyberthreats, agencies can’t rely on reactive security defenses and techniques. What agencies need is a layered security defense that ensures they’re prepared to quickly detect and thwart malicious actors before they wreak havoc on government networks.
Learn how to combat cybersecurity threats.
Why IT modernization and consolidation efforts can create challenges.