Posts Tagged: cybersecurity

Insider Threats: The Stranger Next Door

Cybersecurity dialogues often talk about threats and breaches stemming from hackers, terrorists, and cyber-criminals. However, there are significant threats that come from individuals who are closer than you think – maybe even the person you sit next to at the office. SolarWinds, an IT management software company, recently researched insider threats to the federal government.Read… Read more »

The Tech Loop: Big Data and March Madness

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, IoT, cybersecurity, and big data. Cloud 3, 2, 1. Cloud liftoff. It’s been a little over four years since then-federal CIO Vivek Kundra announced a cloud-first policy as part of theRead… Read more »

The Tech Loop: To Cloud Infinity and Beyond!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include IoT, federal gov, cybersecurity, big data, and cloud.  Internet of Things I support things! Not the most effective campaign mantra, but nonetheless, a bipartisan group of U.S. senators has drafted an InternetRead… Read more »

The 7 Deadly IT Sins

It’s a scary cyber world out there. Threats are becoming more sophisticated, effective, and pervasive everyday. According to a Government Accountability Office report, cyber threats to federal agencies increased 782 percent between 2006 and 2012. What’s more, a Center for Strategic and International Studies study estimated the global cost of cybercrime at over $400 billionRead… Read more »

General Alexander’s Strategy for Effective Cybersecurity

Today, I’m attending Microsoft’s Federal Executive Forum 2015. The day is focused on applying technology solutions to many government challenges, particularly in the area of cybersecurity. But before we dove into the devices, systems, and solutions available to agencies, we heard from General Keith Alexander, former Commander of US Cyber Command, Director of the National Security AgencyRead… Read more »

Automating your Identity and Access Management System

The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »

Finding the Right Balance to Credential Agency Users

The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »

State Technology: A Case For Less Rules, And More Collaboration

Less rules and more talking. Sounds fun, right? Mitch Herckis, Director of Government Affairs at the National Association of State Chief Information Officers (NASCIO), is a proponent of more communication and less outright bans for government cybersecurity. He recently spoke with Christopher Dorobek, host of the podcast DorobekINSIDER, on cybersecurity regulations on the state governingRead… Read more »