Data Tampering: The Quiet Threat
08/23/19 For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzleme…
08/23/19 For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzleme…
08/20/19 The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal …
08/19/19 In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a se…
08/12/19 Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s…
08/06/19 Today’s federal IT pro has a broad range of responsibilities and corresponding talents. The need for a multidisciplinary skillset is only increasing. As environments get m…
08/05/19 Guys, you need to patch your stuff. In April, I had the opportunity to talk to IT pros at four different trade shows. That’s right, four in a month! I’ve been to Germany a…
07/30/19 The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breach…
07/29/19 The summer is full of important dates, from national holidays to family vacations to birthdays and anniversaries big and small. In a few short days, one such birthday is c…
07/18/19 Let’s walk through a typical IT software project. As the IT software project is planned out, the security of the software and the data the software contains is accounted f…
07/16/19 While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cy…
07/15/19 Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have i…
07/02/19 The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical…