category >> cybersecurity
October 11th, 2018
After compliance with federal regulations, 3 strategies to follow are: security with signature codes, encrypt data, and measure security surpluses/deficits
July 18th, 2018
Good intelligence is key to defending agencies against cyber threats. However, an effective program depends on knowing what ‘good intelligence’ means.
- cyber operations, Federal News Radio, FireEye, Innovation in Government, Threat actors, Threat intelligence
July 9th, 2018
Rather than a narrow focus, agencies are taking a broader view of threats. These more comprehensive evaluations are known as digital risk management.
June 12th, 2018
With cyber crime and data breaches accelerating, government agencies must improve their efficiency in conducting digital forensics investigations.
- AccessData, collaborative analysis, Data Breach, forensic investigation, Innovation in Government, Ransomware
April 6th, 2018
As government agencies transition to the cloud, IoT devices will proliferate. The security risk this trend presents in the public sector is clear.
Solving the Top 5 Challenges for Higher Education: A Platform Approach to Securing Education Networks
March 29th, 2018
Higher education institutions are faced with the challenge of balancing high-bandwidth access to resources while blocking threats and intrusions.
March 1st, 2018
Ensuring data privacy and compliance is a challenge, but we’ve identified three best practices amongst federal agencies to effectively mitigate these risks.