Category: Security

author:

Security

Dominating and Protecting the Connected Battlefield

November 12, 2019

“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with highly advanced technology so they can effectively communicate with each other and allies in …


author:

Security

CSAM: Surprising Truths about Compliance and Security

November 1, 2019

In our final post for Cybersecurity Awareness Month, Tim Brown looks at the growing trend of industry-agnostic compliance laws and the relationship between compliance and security. Compliance laws often drive security investments. When the European Union passed the General Data Protection Regulation (GDPR), organizations …




author:

Security

The Do’s and Don’ts of Edge Computing

October 22, 2019

Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments. First, edge computing brings memory and computing power closer to the source of data, …






author:

Security

How Security Leaders Might Minimize Human Error

October 8, 2019

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …