category >> cybersecurity
-
Formalizing Cybersecurity
December 15th, 2014
The Department of Justice (DoJ) and Department of Defense (DoD) both recently outlined plans to create defined cybersecurity roles. There is wide agreement that the next battlefield will likely be a cyber one.
-
The Threat Brief: Start Your Day with Your Own Version of the President’s Daily Brief (PDB)
November 26th, 2014
Not everyone has a staff that collects the morning’s news into the tidy reports that the President and top agency officials receive.
- Tagged Cybersecurity, Threat Brief
-
Cyber Playbook: The Post-Game Show
November 25th, 2014
Back in 2009, President Obama said, “America’s economic prosperity in the 21st century will depend on Cybersecurity.”
-
Meet the Players
November 18th, 2014
Our Cyber Playbook event on Wednesday features a great speaker lineup which GovLoop described by drawing a connection between cybersecurity and football.
- Tagged Cybersecurity, Event, Experian, FireEye, HP
-
Breaking the mold: A New Approach to Cybersecurity
November 7th, 2014
Last week FireEye’s Vice President of Sales, Nick Urick, sat down for an hour long interview on Federal News Radio to talk about FireEye’s approach to cybersecurity.
- Tagged Federal News Radio, FireEye, Mobile, Mobile Government
-
When Data Walks So Do Customers
November 4th, 2014
HyTrust recently conducted a survey of 2,000 consumers to determine the impact of data breaches on their shopping habits.
- Tagged Cybersecurity, Data Breach, HyTrust
-
Redefining IT at the EMC Federal Summit
October 29th, 2014
On October 22, 2014, Carahsoft hosted the 1st EMC Federal Summit: Redefining IT. Sessions covered everything from Big Data to Cyber Security and Data Protection.
- Tagged Big Data, Cybersecurity, Data Protection, EMC
-
Where There’s a Will, There’s a Way
October 24th, 2014
With daily news reports of data and account hacks, it is safe to say that the “bad guys” will find a way into places they should not be. Just because we have an alarm on our house does not mean a cunning burglar can’t circumvent it or a brazen thief will not run in while the alarms ring. The same thing goes for our IT and information security.
-
Insights on the Impact of Insider Threat and Data Localization
October 13th, 2014
Federal Computer Week recently provided a news brief on two key security challenges – Insider Threat and Data Localization. FBI and Department of Homeland Security research showed that businesses incur significant costs ranging from $5,000 to $3 million because of cyber incidents involving disgruntled or former employees. On the point of data localization – the practice of requiring companies to have data centers in their home jurisdictions – a Google executive has spoken out on the inefficiencies and far reaching network design impact such policies would have on organizations.