Cybersecurity ROI: An Oxymoron?
Return on investment: is it worth the money? That is the central question in both government and industry when deciding on any procurement. Demonstrating ROI on cybersecurity products is notoriously difficult, and is one of the underlying reasons for the poor state of our nation’s cybersecurity posture.
How to Make Every Agency Employee a Security Advocate
The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own.
Analysis: DHS Domain Name System Breach Directive
Video: Modernizing Data Protection in the Public Sector
Expert Panel: The Challenges and Opportunities for Modernizing Data Protection
As online data has become ubiquitous, managing that data has become as important an endeavor as amassing and storing it. A host of issues surround data management, not the least of which is security. But many others loom as data increases exponentially both in size and in importance.
BYOx for the Most Secure Spaces
Article written by Jim Hansen, VP of Products, Security, SolarWinds
Earlier this year, the Department of Defense (DoD) released a policy memo stating that DoD personnel—as well as contractors and visitors to DoD facilities—may no longer carry mobile devices in areas specifically designated for “processing, handling, or discussion of classified information.”
White House Cybersecurity Strategy: The Essence
The “National Cyber Strategy”, released recently by the White House, offers a broad blueprint for America’s approach to cybersecurity. Let’s look its four “pillars”, and their key elements.
CrowdStrike Expands Public Sector Footprint as DLT Reinvests in Partner Ecosystem
In a recent blog post, DLT Chief Technology Officer David Blankenhorn shared his insight on DLT’s evolution to a government solutions aggregator:
Cyber Hygiene: Five Ways to Make Your Bed
“Cyber Hygiene”: you know the term, but what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measure of an organization’s overall commitment to security. Still, others think of “cyber hygiene” as simple, readily available technologies and practices for cybersecurity.
See Beyond the Noise: How Nuix Uncovers and Prevents Entitlement Fraud
Benefits and social security fraud are a huge cost to taxpayers. In 2016, the White House estimated these losses at $144 billion. Fraud can take many forms from making false statements on a social security claim, misuse of benefits by a family member or friend, altering claims, duplicate billing for the same service, embezzlement, and so on.
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security
City of Fort Worth, TX, Protects Sprawling IT Environment with Powerful And Innovative Endpoint Security