Security

Latest Posts in Security

Maintaining a Secure Environment: Understanding Its Components

In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a secure environment. We’ve…

Maintaining a Secure Environment: Use Cases Build a Security Policy

Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s environment is an ecosystem comprised of…

The Soft Skills Gap Is Real; Nontechnical Skills Needed By Every Federal IT Pro

Today’s federal IT pro has a broad range of responsibilities and corresponding talents. The need for a multidisciplinary skillset is only increasing. As environments get more complex and teams grow,…

Patch Management Best Practices – Why Does Patching Hurt So Much?

Guys, you need to patch your stuff. In April, I had the opportunity to talk to IT pros at four different trade shows. That’s right, four in a month! I’ve…

Making Every Agency Employee a Security Advocate

The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may…

Using Our Brain (a Reflection on FaceApp and Harry Potter)

The summer is full of important dates, from national holidays to family vacations to birthdays and anniversaries big and small. In a few short days, one such birthday is coming…

Why Investing in Software Security Is Worth It

Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be…

Giving SIEM Tools a Role in Your IT Security Operations

While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…

Information Security: Defense-in-Depth Style

Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have…

Tips for Building a Battle-Hardened Network

The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical to the Army’s…