Bad User Experience: Another Form of Vulnerability
By Rob JoyceMaking security too difficult for users can hamper information assurance, so finding a balance is important.
View ArticleData Loss Prevention: How to Stop Inside Jobs
By Alan JochNew data loss prevention solutions target internal security threats to sensitive and valuable information.
View ArticleStrategies for Preventing a Data Breach
By Joel SnyderFollow these tips to maintain control of mission-critical information.
View ArticleLocking Down BYOD
By Karen D. SchwartzAgencies find ways to accommodate employees’ personal devices on federal networks.
View ArticleFirewall Rule Management Is the Key to Network Security
By Mike ChappleFollow these best practices to more effectively manage firewalls and improve security.
View ArticleWhy Cybersecurity Is So Important in Government IT [Infographic]
By Anita FerrerOngoing threat requires ongoing attention and investment.
View ArticleHow the Health and Human Services Department Addressed Data Loss Prevention
By Centralized security helps HHS prevent data loss.
View ArticleAutomatic or Manual: An Explanation of Two Types of Remote Wiping
By FedTech StaffMDM software is vital for the success of BYOD programs in government.
View ArticleHow to Defend Against Evolving Threats
By Karen ScarfoneFocusing on securing devices is insufficient — agencies must also take steps to secure their data.
View ArticleThe State of information Security in the Federal Government
By FedTech StaffAn increasing dependence on technology is putting sensitive data and critical systems at risk.
View ArticleHow Enterprise Security Operations Centers Strengthen Agencies’ Cyberdefenses
By Wylie WongStandardizing security protocols across the enterprise helps government keep data safe.
View Article11 Concerning Cybersecurity Stats About the Federal Government
By Jimmy DalyMeriTalk’s latest survey indicates that noncompliance is a key security issue.
View ArticleHow to Help DLP and Encryption Coexist
By Karen ScarfoneLearn where to incorporate data loss prevention technologies on encrypted networks.
View ArticleWhat Is DLP Anyway?
By Joel SnyderData loss – or leak -- prevention is an art more than a science. Follow these steps to keep data safe.
View ArticleThe Case for Professionalizing Cybersecurity
By Franklin S. ReederNow is not the time to hold back on training workers to protect critical systems.
View ArticleSymantec Details the Latest Threats to Government Cybersecurity
By Morgan LittleThe 2014 Internet Security Threat report shows just how vulnerable agencies are.
View ArticleHow Many Layers Does Your Security Solution Protect? [#Infographic]
By It’s not just about breaching the front gates, but also about protecting the kernel.
View ArticleHow the Cybersecurity Framework Affects Government
By Leon ErlangerDesigned to protect infrastructure, NIST’s framework stands to impact agencies, too.
View ArticleWarning: You May Have Already Been Hacked
By Nicole Blake JohnsonOne senator is requesting FBI data to determine which federal agencies have not fallen victim to hackers.
View ArticleAre You Putting Your Agency’s Networks at Risk?
By Nicole Blake JohnsonAnswer these 12 short questions to find out if you’re opening your organization up to potential vulnerabilities.
View Article
More Pages to Explore .....