category >> cybersecurity
-
One Simple Strategy to Guard Your Most Valuable Data – Spotlight on Digital Rights Management
October 2nd, 2017
There are some truly effective data-centric tools out there to add to your security arsenal – and digital rights management is one of the best.
- Tagged Adobe, CDM, Digital Rights Management, FedRAMP, GSA
-
What does IoT Security Mean For This Year’s DoDIIS conference?
August 11th, 2017
DoDIIS brings together members from military, civilian, government and industry backgrounds into a community driven by innovation and collaboration.
- Tagged DoD, Government Cybersecurity
-
Mobility Checklist: Ensure your Agency’s Security
July 18th, 2017
Only by managing with a holistic approach – network access, traffic and permissions – can organizations get a handle on mobility and reap its benefits.
- Tagged BlackBerry, Cybersecurity, Government Technology, Mobility
-
A Network Visibility Platform: A More Holistic Approach to Network Security
July 11th, 2017
In this time of command and control (C&C) attacks, network visibility is not only essential for optimum functioning, but critical to network security.
- Tagged Cybersecurity, Gigamon, Government Technology
-
The WannaCry Wake-Up Call: 7 Tips to Prevent the Next Ransomware Outbreak
May 25th, 2017
WannaCry may be over, but bad actors are constantly planning bigger, deadlier attacks – it's imperative we re-evaluate security postures.
- Tagged Cybersecurity, Ransomware, WannaCry
-
Data-Protection-as-a-Service Poised for Staggering Growth by 2024
May 17th, 2017
Applying an as-a-service model to delivering security solutions holds great promise for agencies trying to make the most of budgets, time, talent and data
- Tagged Cybersecurity, data, Dell EMC, Government Technology
-
In Defense of Data: DHS Requests CDM Expansion to Include Data-centric Security
April 28th, 2017
Lately, it seems like a day doesn’t go by without hearing about havoc wreaked by cyberattacks in public and private sectors alike.
- Tagged Adobe, CDM, Cybersecurity
-
Find, Fix and Fortify: A New Approach to Data-Centric Security
March 13th, 2017
We need layers of security and other cultural and technological developments to keep government data up-to-date and secure.
- Tagged Cybersecurity, Government Cybersecurity, HPE
-
A Next-Generation Cybersecurity Response Strategy: Triaging Threats
March 8th, 2017
Suffering from cybersecurity alert fatigue? Triaging your agencies incident-response alarms can help your team keep up with all of the alerts.