Latest In

cybersecurity

CSAM: Safeguarding Clients Against Insider Betrayals (and Mistakes)
October 11, 2019
Colin Knox
In the second part of our National Cybersecurity Awareness Month series, Colin Knox offers two key tips to help you prevent insider attacks and police data and systems access. We’re…
How Security Leaders Might Minimize Human Error
October 8, 2019
Jim Hansen
A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…
Assessing the Navy’s New Cybersecurity Program
September 24, 2019
Jim Hansen
The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…
Maintaining a Secure Environment: Best Practices for Design and Deployment
September 18, 2019
Natalie Timms
The first three blogs in this series were all about building a blueprint for a well-designed environment. In this article, we’ll review more practical considerations to influence the overall architecture…
Maintaining a Secure Environment: Compliance Considerations
September 11, 2019
Natalie Timms
A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should…
Data Tampering: The Quiet Threat
August 23, 2019
Finn Turner
For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however,…
2 Key Assets in the Government’s Cybersecurity Battle (Part I)
August 20, 2019
Jim Hansen
The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…
Maintaining a Secure Environment: Understanding Its Components
August 19, 2019
Natalie Timms
In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…
Maintaining a Secure Environment: Use Cases Build a Security Policy
August 12, 2019
Natalie Timms
Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s environment is an ecosystem comprised of…
Making Every Agency Employee a Security Advocate
July 30, 2019
Jim Hansen
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may…
158