tag >> splunk
October 3rd, 2016
Cybersecurity in government is no longer an afterthought. Security officers are helping to strategically design their networks and systems to comply with cyber demands from the moment they begin considering acquiring a new solution. The entire government cybersecurity community, including industry, academia, executives, and agencies themselves, have committed to work together to counter threats intelligently.
- Akamai, Anomali, CyberArk, CyberSponse, FireEye, HPE, HyTrust, NIST, Recorded Future, Resilient Systems, Splunk, Symantec, Tripwire, Vormetric
September 19th, 2016
The Federal Government has placed a big bet on CDM to enable civilian agencies to do the right thing when it comes to cybersecurity, but agencies need to start using the program to its full potential.
August 4th, 2016
As government agencies work together and share information, the potential for security risks increase. The benefits of this sharing and collaboration are significant, making it essential to secure these connections quickly. The Department of Homeland Security is leading the government-wide effort around Continuous Diagnostics and Mitigation (CDM), which, among other things, aims to make connections between government agencies more secure. The program vets a broad array of CDM-related products and then recommends the appropriate software for federal, as well as state and local, agencies. CDM solutions help agencies identify cybersecurity risks on an ongoing basis, prioritize risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first, allowing the valuable cross-agency communication and sharing to continue.
July 21st, 2016
In the past, it was almost impossible to pull valuable, actionable information from the enormous volume of information big data holds, but with the technology and tools available today, organizations can quickly unlock new Operational Intelligence (OI) to make more informed decisions across IT systems and technology.
June 23rd, 2016
The security of armed services agencies’ IT infrastructure is at risk. Faced with increasingly complex digital threats, defense organizations must manage and harden the growing expanse of their IT infrastructures to ensure the safety of classified information and operations support systems. It’s clear that defense organizations face a critical challenge in managing the balance between access and security.
May 17th, 2016
This month’s focus in Carahsoft’s Innovation in Government series, in collaboration with Government Computer News, focuses on “Securing the Enterprise.” Security has been difficult for enterprises of all kinds, both public and private, to deal with because it is a journey, not a destination. The thought leaders included in this month’s feature can offer you a lot of technical knowledge and advice to make the journey easier.
- Adobe, F5, F5 Networks, Government Cybersecurity, HyTrust, Innovation in Government, Qlik, Red Hat, Splunk, VMware
April 25th, 2016
Furthermore, the department maintains a statewide video camera network that allows motorists to view traffic levels prior to travelling. With all these roadways to take care of on top of other critical duties, NDOT deals with huge amounts of big data; as such, they are tasked with the responsibility of ensuring the security of this information.
April 19th, 2016
Beyond the keychain used to carry car keys, we all have a separate set of keys that gives us access to the information and systems we need to do our jobs effectively and securely. Whether you’re an individual end-user or a system administrator with far-reaching access, these keys are critical to day-to-day online work. Losing the keys to your organization’s online world have consequences far beyond the inconvenience of waiting for a locksmith.