Security

Latest Posts in

Details on DISA’s Infrastructure “Hardening” Rules

The Defense Information Systems Agency (DISA) has a set of security regulations to provide a baseline standard for Department of Defense (DoD) networks, systems, and applications. DISA enforces hundreds of…

Careless and Malicious Insider Threats Are on the Rise Despite Better Detection

According to a 2019 Federal Cybersecurity Survey released last year by IT management software company SolarWinds, careless and malicious insiders topped the list of security threats for federal agencies. Yet,…

New Laws Alone Won’t Be Enough to Secure IoT Devices

Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act…

Three Ways the Department of Defense Can Plug Security Holes

An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD…

Modernizing Security to Protect Next-Generation Federal Networks

As agencies across the federal government modernize their networks to include and accommodate the newest technologies such as cloud and the Internet of Things (IoT), federal IT professionals are faced…

Federal IT Pros Optimistic About Security, but Insider Threats Remain a Challenge

Federal IT professionals feel threats posed by careless or malicious insiders and foreign governments are at an all-time high, yet network administrators and security managers feel like they’re in a…

You Too Can Stink at Information Security!

“Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can…

4 Keys to Successful Cyberdefense Automation

Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to…

3 Ideas to Build a Better Cybersecurity Strategy

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies…

Using User Access Management to Defend Against Insider Threats

According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said…