How agencies learned to stop worrying and love the blockchain

How agencies learned to stop worrying and love the blockchain

A little uncertainty is a small price to pay for the promise of better security.

06/21/18

The GDPR initiative and how it affects US government and industry

The GDPR initiative and how it affects US government and industry

Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home.

06/05/18

The Top 3 cyber priorities for DOD’s incoming CIO

The Top 3 cyber priorities for DOD’s incoming CIO

The DOD’s new top IT executive Dana Deasy will be an important cog in DOD’s big push toward universal defense cloud adoption, facilitating organizational changes that will make the military’s cyber defense more streamlined and...

04/23/18

Regulation is the best hope for IoT security – imagine that!

Regulation is the best hope for IoT security – imagine that!

Far from stifling technological innovation, regulation could in fact create lucrative new opportunities for security vendors.

03/12/18

Are shared services the answer to data protection?

Are shared services the answer to data protection?

There are still some issues to be addressed before everyone will be fully on board with the idea of shared services in government. But because the government is increasingly moving to the cloud, the sooner everyone is on board, the...

02/13/18

Why the cybersecurity industry is failing government

Why the cybersecurity industry is failing government

One problem is that tech companies still try to force-fit their commercial applications into the federal space. But that's not the only issue...

01/10/18

The top 3 hot spots for federal IoT security

The top 3 hot spots for federal IoT security

We are closer than ever to enjoying the benefits of IoT, so let’s not forget these things need to be secure. It’s a promising technology that must be wrapped with security from the get-go. If we don’t get it right, the consequences...

11/29/17

The need for better proactive cyber defense

The need for better proactive cyber defense

We can learn more about bad actors by using the same kinds of visibility techniques many organizations are using to look at their own IT networks. Why not use these same tools to get a better handle on how cybercriminals work?

10/12/17

How data analytics can boost health IT security

How data analytics can boost health IT security

As interactive devices and the internet of things become more entrenched in military health, the health information of our military can easily become compromised. We don’t need systems to tell us what already happened, but to predict...

09/05/17

The biggest threat to cybersecurity is not enough info sharing

The biggest threat to cybersecurity is not enough info sharing

Information sharing may be the best cybersecurity strategy for government agencies as they face evolving threats. But are agencies ready for the level of sharing needed to make it really work?

07/26/17

Government cloud adoption may make security easier

Government cloud adoption may make security easier

Federal IT leaders describe how they're safeguarding their agencies in an era of emerging cybersecurity threats; what's been successful; and what's still posing a major challenge.

06/29/17

How 'smart cities' push IoT cybersecurity for state and local IT

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT...

05/16/17

How to clean up security vulnerabilities with better cyber hygiene

How to clean up security vulnerabilities with better cyber hygiene

One of the more neglected aspects of network security is people. Just as we grew up learning good personal hygiene practices, we are now obligated to teach similar practices among the users of our networks to prevent cyber attacks and...

04/06/17

Network security demands better procurement processes

Network security demands better procurement processes

The federal government is spending millions of dollars to deal with the aftermath of cyber breaches but why aren't we putting more resources and money into preventing them in the first place?

03/02/17

Load More