Ransomware: Emergent Threat or Opportunity?
The ransomware surge complicates the risk management picture, but it may also help bring priorities into focus.
The ransomware surge complicates the risk management picture, but it may also help bring priorities into focus.
How can a group of individuals spread across the globe, working behind their personal computers, with no real budget, successfully take down organizations and governments with millions—sometimes billions—of dollars to spend on cybersecurity?
If you’re a federal IT decision maker, it’s worth taking time to analyze your defenses and question your readiness to tackle new age cyberthreats.
IoT provides a number of potential benefits for the federal space, but risks remain. There’s a long road ahead, but with stronger authentication methods, education and industry collaboration, the federal government could thrive in the IoT revolution.
Developing a truly effective cybersecurity culture requires that agencies take a deeper look at how they promote and enforce cybersecurity policies among their employees. With that in mind, here are five tips we’ve found beneficial for fostering a cyber-aware professional culture.
Are smart cards the end-all, be-all answer to network security? If you answered yes, think again.
For federal agencies, the crux of an effective cybersecurity strategy is both obvious and challenging: a valid, enforceable security policy. But what does that kind of strategy look like, and how do you achieve it?
IT professionals at all public sector agencies can ensure that their infrastructures are prepared for this wave by employing a few basic strategies.
External threats may be more sensational — the sophisticated hackers who troll our networks phishing for a way in are often the headline-grabbers — but for many federal network administrators, the biggest threat may be sitting right next to them.
Despite its status as a threat magnet, federal IT professionals can actually use social media networks to thwart attackers.