You Too Can Stink at Information Security!
01/06/20 “Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can st…
01/06/20 “Security? We don’t need no stinking security!” I’ve actually heard a CTO utter words this effect. If you subscribe to a similar mindset, here are five ways you too can st…
12/31/19 Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial in…
12/24/19 Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cy…
12/17/19 According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agen…
12/03/19 The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioriti…
11/20/19 At the beginning of October, we attended it-sa for the second time. it-sa, which has been taking place in beautiful Nuremberg over the last ten years, has grown from a med…
11/12/19 “Dominance” and “protection” sum up the Defense Department’s goals as U.S. armed forces begin to modernize their networks and communications systems. DOD is investing sign…
10/27/19 For many organizations, the decision of moving workloads to the cloud is all over but the shouting. The problem is that the shouting is pretty loud, and often centers arou…
10/25/19 Security isn’t just about the latest technical controls or the newest threat. Rani Johnson talks about two areas of security she thinks should get more emphasis. If you wa…
10/22/19 Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computin…
10/18/19 In our third Cybersecurity Awareness Month blog, Thomas LaRock explains how good backup and email protection could help save your bacon if the worst happens. An executive …
10/15/19 Over the past few years, several critical cybersecurity frameworks have been introduced to help agency IT professionals detect and deter stealthy intruders. These include …