Jim has 18 years of experience building and delivering simple and easy-to-use software solutions in the security market. He is passionate about customers, understanding their needs, and delivering solutions that make their jobs easier and their infrastructures and data more secure.


author:

Security

4 Keys to Successful Cyberdefense Automation


Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to ascertain the severity of potential threats and remediate them through the appropriate automated responses. …


author:

Security

3 Ideas to Build a Better Cybersecurity Strategy


Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim …


author:

Security

Using User Access Management to Defend Against Insider Threats


According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said the greatest source of security threats to federal agencies is careless and/or untrained agency …


author:

Security

Worried About Protecting Your Data? CDM Is Here to Help


The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints. How can a federal IT pro more effectively improve an agency’s endpoint and data …


author:

Security

How Security Leaders Might Minimize Human Error


A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …


author:

Security

Assessing the Navy’s New Cybersecurity Program


The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors …




author:

Security

Making Every Agency Employee a Security Advocate


The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to …


1

2