category >> cybersecurity
-
3 Trends in Mobile Device Management
November 1st, 2018
Protecting mobile devices with consolidation and centralization of devices, good policies and apps with secure containers
-
Managing Cybersecurity Priorities in a World of Data
October 30th, 2018
Threat intelligence software helping sort and sift through streams of data and to see potential threats.
-
Adaptive Response in a World of Evolving Threats
October 25th, 2018
More trends toward IoT and Bring Your Own Devices means more security is needed. Adaptive Response is critical for cybersecurity.
-
Why Agencies Need FedRAMP & TIC to Harmonize
October 24th, 2018
FedRAMP & TIC are based on different standards and need to work together to secure remote networks.
- Tagged FedRAMP, Innovation in Government, TIC, Zero Trust, Zscaler
-
Keeping a Grip on Security in a World of Attacks
October 23rd, 2018
The importance of approaching security with a mindset that prioritizes risk-management and adaptive response.
-
Zero Trust and Other Cybersecurity Trends
October 18th, 2018
Cybersecurity trends, like Zero Trust, consumption gap and AI/machine learning, are helping against cyber attacks.
-
The Emerging World of Drone Forensics: Extracting Data from an Unmanned Aerial Vehicle
October 17th, 2018
Drone Forensics and data extraction are becoming increasingly important to focus on for government and law enforcement officials.
-
How Adaptive Technologies Support Integrated Risk Management Approaches
October 16th, 2018
Adaptive technologies improve an organization's defense and security with compliance monitoring, semantic approach to analytics and real-time responses
-
3 Cyber Strategies That Go Beyond Compliance
October 11th, 2018
After compliance with federal regulations, 3 strategies to follow are: security with signature codes, encrypt data, and measure security surpluses/deficits