Category: Security

author:

Security

Solving the Contractor Breach Challenge

May 5, 2020

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed by contractors. According to our Federal Cybersecurity Survey Report from last year, more than …


author:

Security

Securing a Tide of the Internet of Things

April 21, 2020

IoT has the potential to offer state and local municipalities real and tangible benefits for their citizens. The IoT is already powering smart city efforts throughout the country, through things like smart grids, automatic flood detection, and more. The city of Chicago alone has …


author:

Security

The Top Five Security Fails in Every Data Breach

April 20, 2020

If your company hasn’t had a data breach, it’s only a matter of time until it happens. Unless you begin to make a big investment in security, have regular audits and penetration testing, and instill a culture that values customer data, breaches are bound …


author:

Security

Assemble a Team of IT Experts Focused on Cybersecurity

April 14, 2020

In today’s world of constant cyberthreats from terrorism, hackers, and viruses, public and private sector organizations need to assemble a strong, experienced team of security experts. But finding a talented and trained staff becomes a problem when, according to a June 2019 Forbes article, …



Security

Medical Device Hacking Worldwide: Part 2

March 20, 2020

Did you read my last post with the positive story of how people are community-hacking their medical devices to improve their quality of life? While writing my last post, I also became aware of serious security concerns. This post will focus on the challenges …




Networks Security

Unpopular Opinion: How SD-WAN Will Improve Security

February 21, 2020

The consensus is software-defined networking in a wide area network (SD-WAN) will provide organizations unprecedented agility but possibly at the expense of security, as traffic flow changes to a distributed model without the safety of traditionally centralized security tools. Being the consummate contrarian, I …


author:

Security

Details on DISA’s Infrastructure “Hardening” Rules

February 18, 2020

The Defense Information Systems Agency (DISA) has a set of security regulations to provide a baseline standard for Department of Defense (DoD) networks, systems, and applications. DISA enforces hundreds of pages of detailed rules IT pros must follow to properly secure or “harden” the …