Tag: cybersecurity

author:

Security

Three Ways the Department of Defense Can Plug Security Holes


An early 2019 report from the Defense Department Officer of Inspector General revealed how difficult it’s been for federal agencies to stem the tide of cybersecurity threats. Although the DoD has made significant progress toward bolstering its security posture, 266 cybersecurity vulnerabilities still existed. …




author:

Security

Dominating and Protecting the Connected Battlefield


“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with highly advanced technology so they can effectively communicate with each other and allies in …


author:

Security

The Do’s and Don’ts of Edge Computing


Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments. First, edge computing brings memory and computing power closer to the source of data, …




author:

Security

How Security Leaders Might Minimize Human Error


A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …


author:

Security

Assessing the Navy’s New Cybersecurity Program


The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors …