cybersecurity

Tag: cybersecurity

Federal IT Pros Optimistic About Security, but Insider Threats Remain a Challenge

Federal IT professionals feel threats posed by careless or malicious insiders and foreign governments are at an all-time high, yet network administrators and security managers feel like they’re in a…

Dominating and Protecting the Connected Battlefield

“Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing significant resources in providing troops with…

Account Takeover IS Your Problem — SolarWinds TechPod 020

Phishing and malware are scary enough, but the number one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why?…

The Do’s and Don’ts of Edge Computing

Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments.…

Leveraging Key Strategies from Cybersecurity Frameworks to Improve Security

Over the past few years, several critical cybersecurity frameworks have been introduced to help agency IT professionals detect and deter stealthy intruders. These include the Cyber Threat Framework (CTF), the…

CSAM: Safeguarding Clients Against Insider Betrayals (and Mistakes)

In the second part of our National Cybersecurity Awareness Month series, Colin Knox offers two key tips to help you prevent insider attacks and police data and systems access. We’re…

How Security Leaders Might Minimize Human Error

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…

Maintaining a Secure Environment: Best Practices for Design and Deployment

The first three blogs in this series were all about building a blueprint for a well-designed environment. In this article, we’ll review more practical considerations to influence the overall architecture…

Maintaining a Secure Environment: Compliance Considerations

A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should…