Category: Security

author:

Security

Dominating and Protecting the Connected Battlefield


“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with highly advanced technology so they can effectively communicate with each other and allies in …


author:

Security

CSAM: Surprising Truths about Compliance and Security


In our final post for Cybersecurity Awareness Month, Tim Brown looks at the growing trend of industry-agnostic compliance laws and the relationship between compliance and security. Compliance laws often drive security investments. When the European Union passed the General Data Protection Regulation (GDPR), organizations …



author:

Security

The Do’s and Don’ts of Edge Computing


Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments. First, edge computing brings memory and computing power closer to the source of data, …






author:

Security

How Security Leaders Might Minimize Human Error


A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …