Category: Security

author:

Security

Three Ways the Department of Defense Can Plug Security Holes

January 21, 2020

An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD has made significant progress toward bolstering its security posture, 266 cybersecurity vulnerabilities still existed. …




author:

Security

You Too Can Stink at Information Security!

January 6, 2020

“Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can stink at information security. Train once and never test Policy says you and your …


author:

Security

4 Keys to Successful Cyberdefense Automation

December 31, 2019

Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to ascertain the severity of potential threats and remediate them through the appropriate automated responses. …


author:

Security

3 Ideas to Build a Better Cybersecurity Strategy

December 24, 2019

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim …


author:

Security

Using User Access Management to Defend Against Insider Threats

December 17, 2019

According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said the greatest source of security threats to federal agencies is careless and/or untrained agency …


author:

Security

Worried About Protecting Your Data? CDM Is Here to Help

December 3, 2019

The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints. How can a federal IT pro more effectively improve an agency’s endpoint and data …


author:

Security

it-sa in Germany – Recap

November 20, 2019

At the beginning of October, we attended it-sa for the second time. it-sa, which has been taking place in beautiful Nuremberg over the last ten years, has grown from a medium-sized Germany-exclusive trade show to the largest show for IT security in Europe. This …


author:

Security

Dominating and Protecting the Connected Battlefield

November 12, 2019

“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with highly advanced technology so they can effectively communicate with each other and allies in …