Agencies can ease the transition to cloud-based CDM by ensuring they have the appropriate FIPS 199 alignment, legal requirements, contract considerations, technical compatibilities and experience.
As agencies seek to increase productivity in the field they are increasingly looking to get mobile devices like smartphones, tablets and 2-in-1 devices into the hands of their employees.
According to the GAO, inadequate access control is a common weakness across 24 major agencies.
While data and device encryption is the first line of defense, it is not impervious to attack, so diligent IT departments should take a layered and persistent approach to security.
When government agencies combine solutions from cloud providers with third-party products, they can set up monitoring and access controls to provide the same data integrity they would expect from their own systems.
The challenges of controlling physical access in emergencies may be solved by a nationwide network of standard first responder credentials.
Homeland Security Department’s Transition to Practice program helps software out of the lab and into agencies.
Agencies are cracking down on administrative access to mitigate the damage an insider can cause, but hackers are adjusting their tactics as well and aiming them squarely at the federal government.
The Archer monitoring and compliance platform from RSA is a finalist to provide a dashboard for Continuous Diagnostics and Mitigation that will give enterprise visibility into the security of federal IT systems.
The company's data CyberSecurity Edge ensures customers' systems and information are protected from cyber risks across multiple platforms.
With open-source Drupal as the foundation of a defense-in-depth strategy, agency IT managers can analyze and identify potential threat vectors, including internal and external threats.
The University of New Mexico will conduct field tests of recovery solutions for cyber-infrastructure backbone attacks from weapons of mass destruction and other real-world threats.