The more things change, the more they stay the same. Although this adage holds much truth, it’s important to understand how it applies to the digital transformation we’ve witnessed this year. We’re in what’s truly…
One of the biggest roadblocks for getting anyone to listen to what you want them to do is trust, or more accurately, a lack of trust. You could say we’re…
Many organizations across the U.K. are tackling the three main factors behind digital transformation: cloud technology, IoT, and employee mobility. However, one downside to increased digitization is how this opens…
In the first of these two articles, we covered the first five steps public sector organizations should take to change how they think about their cybersecurity to overcome this challenge.…
The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major…
Security operations and IT operations have a lot of differences, but more similarities than you may think, especially as their worlds are merging more quickly than ever before. This presentation will delve into research driven…
Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…
Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed…
When it comes to IT security, it can feel overwhelming. What needs securing and at what level? How do you prioritize? But when considering risk, this is very different conversation.…
According to a 2019 Federal Cybersecurity Survey released last year by IT management software company SolarWinds, careless and malicious insiders topped the list of security threats for federal agencies. Yet,…