Washington Navy Yard

An IT office, thrust into the line of fire

The Naval Sea Systems Command’s Information Office, which manages NAVSEA’s IT workforce, was charged with picking up the pieces after a tragedy struck the Navy Yard one year ago.

EtherWatch invisibly protects industrial control systems

EtherWatch invisibly protects industrial control systems

The military-grade cybersecurity appliance eliminates risks associated with operating industrial control systems over networks.

Sun rising behind the US Capitol

GCN names 2014 executives of the year

GCN names Department of Army Deputy CIO Michael Krieger, Central Intelligence Agency CIO Doug Wolfe and FireEye Inc. Global Government Liaison, Tony Cole as 2014 GCN executives of the year.

Cybersecurity playbook

Beyond compliance: Protecting data with automated security playbooks

Security playbooks powered by intelligent automation can mitigate the fallout from breaches while meeting important compliance standards.

How hybrid analytics can mitigate insider threats

How hybrid analytics can mitigate insider threats

Because no single approach can detect every threat, hybrid analytics can help IT managers uncover hidden, suspicious activities and see the bigger picture.

AT&T offers secure links to IBM SoftLayer cloud

AT&T offers secure links to IBM SoftLayer cloud

IBM and AT&T formed a partnership to let customers connect their private IT systems to IBM's SoftLayer cloud using AT&T's NetBond secure virtual private network service.

Cloud-based CDM

Ready to move continuous monitoring to the cloud?

Agencies can ease the transition to cloud-based CDM by ensuring they have the appropriate FIPS 199 alignment, legal requirements, contract considerations, technical compatibilities and experience.

10 mobile features workers want – and agencies need

10 mobile features workers want... and agencies need

As agencies seek to increase productivity in the field they are increasingly looking to get mobile devices like smartphones, tablets and 2-in-1 devices into the hands of their employees.

Access controls

Access controls fall short in most agencies

According to the GAO, inadequate access control is a common weakness across 24 major agencies.

Persistence tech offers layered approach to security

Persistence tech offers layered approach to security

While data and device encryption is the first line of defense, it is not impervious to attack, so diligent IT departments should take a layered and persistent approach to security.

Hand below security icons

3 elements for success for the FISMA High cloud

When government agencies combine solutions from cloud providers with third-party products, they can set up monitoring and access controls to provide the same data integrity they would expect from their own systems.

Firemen running

DC tests ID management for first responders

The challenges of controlling physical access in emergencies may be solved by a nationwide network of standard first responder credentials.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.