Security

Latest Posts in

Data Tampering: The Quiet Threat

For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however,…

2 Key Assets in the Government’s Cybersecurity Battle (Part I)

The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…

Maintaining a Secure Environment: Understanding Its Components

In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…

Maintaining a Secure Environment: Use Cases Build a Security Policy

Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s environment is an ecosystem comprised of…

The Soft Skills Gap Is Real; Nontechnical Skills Needed By Every Federal IT Pro

Today’s federal IT pro has a broad range of responsibilities and corresponding talents. The need for a multidisciplinary skillset is only increasing. As environments get more complex and teams grow,…

Patch Management Best Practices – Why Does Patching Hurt So Much?

Guys, you need to patch your stuff. In April, I had the opportunity to talk to IT pros at four different trade shows. That’s right, four in a month! I’ve…

Making Every Agency Employee a Security Advocate

The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may…

Using Our Brain (a Reflection on FaceApp and Harry Potter)

The summer is full of important dates, from national holidays to family vacations to birthdays and anniversaries big and small. In a few short days, one such birthday is coming…

Why Investing in Software Security Is Worth It

Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be…

Giving SIEM Tools a Role in Your IT Security Operations

While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…