category >> cybersecurity
October 7th, 2016
Cybersecurity in government is paramount today. Even with new policies, like last year’s Cyber Security Sprint or the Cybersecurity National Action Plan, the number of attacks against federal systems continues to grow at astonishing rates – 59% of respondents in a recent federal executive survey disagreed that the federal government is capable of detecting ongoing cyber-attacks.
October 4th, 2016
This deluge of images and posts on social media brings us to a critical point. Security in general, including infosec, starts at the physical layer. Below is an illustration of the Seven Layers of the OSI Model, note Physical is the base here as well. Sadly many, if not most, illustrations of the OSI Model neglect two of the more important layers, Budgetary and Political, but that is a story for another time.
October 3rd, 2016
Cybersecurity in government is no longer an afterthought. Security officers are helping to strategically design their networks and systems to comply with cyber demands from the moment they begin considering acquiring a new solution. The entire government cybersecurity community, including industry, academia, executives, and agencies themselves, have committed to work together to counter threats intelligently.
- Akamai, Anomali, CyberArk, CyberSponse, FireEye, HPE, HyTrust, NIST, Recorded Future, Resilient Systems, Splunk, Symantec, Tripwire, Vormetric
September 19th, 2016
The Federal Government has placed a big bet on CDM to enable civilian agencies to do the right thing when it comes to cybersecurity, but agencies need to start using the program to its full potential.
September 16th, 2016
The principles behind the concept of cyber resilience are not new to federal government agencies. Some agencies have been practicing them for a long time. What is new, though, is a commitment to those principles, because in some cases they’re directly contrary to how agencies have practiced cybersecurity in the past.
September 9th, 2016
Effectively protecting data, infrastructure, and information in today’s threat landscape can be tricky – especially as malicious actors, like multi-national crime syndicates and hacktivists, as well as ransomware and other malware tools, become more complex. Today’s cyber-attacks are more sophisticated, take place at a larger scale, and incorporate more techniques than ever before. Because of this, government agencies find themselves more at odds than ever with this new environment.
September 7th, 2016
The fundamentals of cybersecurity still rest on perimeter security, access control for the ingress and egress of data, strong authentication, and data encryption. But these strategies alone are simply not enough for government agencies to defend themselves. Today, we have to assume that a breach is inevitable and, because of that, we need to be able to respond quickly with the tools at hand.
September 2nd, 2016
The Symantec Government Symposium held in DC on August 30th brought together the best cybersecurity minds in government and in the industry to discuss a variety of topics which all ultimately had one core theme: the ability to gain intelligence from security data to stay agile and smart against today’s evolving threat landscape. The topics of conversation during the keynote presentations, TECHTalks, and breakout sessions can be broken down into three major categories with actionable items for government to improve their cyber posture.