Finding Zen – How IT Ops and IT Security Can Work Together
11/20/20 IT Ops and security teams don’t always have a perfect relationship. While IT Ops teams are focused on making work and communication seamless and accessible (and therefore …
11/20/20 IT Ops and security teams don’t always have a perfect relationship. While IT Ops teams are focused on making work and communication seamless and accessible (and therefore …
11/16/20 With the U.S. national security plan highlighting the need for both information dominance and protection, the Department of Defense is considering plans like modernizing m…
10/27/20 Protecting your identity is becoming more and more difficult. Though many people don’t stop to consider it, even the most minor conveniences can go hand in hand with an in…
10/26/20 Every year brings new opportunities for federal IT professionals to reduce risk by addressing threats—both existing and emerging—with new tools, technologies, and tactics.…
10/14/20 The zero-trust model is critical for building a successful strategy to detect both internal and external cybersecurity threats. This approach requires setting and maintain…
10/13/20 A fully grown security operations center (SOC) was, until recently, a luxury, affordable for the largest organizations only, but even in global players, budget constraints…
10/06/20 One of the biggest roadblocks for getting anyone to listen to what you want them to do is trust, or more accurately, a lack of trust. You could say we’re facing an unprece…
10/05/20 Microsoft Active Directory (AD) is the nerve center enabling your federal agency to access the systems and applications staff members need to do their jobs. AD is also a h…
09/22/20 The more applications, information, and processes living in the digital environment, the more opportunities there are for black hats. Unfortunately, the enormous value pla…
09/15/20 The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need…
09/08/20 In the first of these two articles, we covered the first five steps public sector organizations should take to change how they think about their cybersecurity to overcome …
09/01/20 The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting t…