Author Archive

Brent Hansen

Brent Hansen is federal CTO of Thales Trusted Cyber Technologies.
Cybersecurity

4 steps to reducing ransomware damage

Access control and data encryption management is the most effective protection – not only from ransomware, but from insider threats, rogue processes, malware and more.

Cybersecurity

Data privacy demands a unified view across siloes

A cross-enterprise privacy solution improves workflow and allows the creation and implementation of unified data privacy policies, giving agencies a clear understanding of sensitive data.

Cloud & Infrastructure

Preparing for the CDM dashboard: Big data and the cloud

Big data and analytics are empowering federal agencies to make decisions faster than ever, but the added capabilities require a more stringent cloud security and data protection strategy.

Cybersecurity

What can agencies do today to guard against hacks like SolarWinds?

By establishing strong supply chain risk management requirements and verifying all updates for critical networks and third-party software, agencies can better protect their networks against future incursions.

Cloud & Infrastructure

Government file sharing: What IT managers should know

IT managers must ensure that their agency’s file sharing solution is effective for users while providing the assurance that critical data remains protected.

Cybersecurity

Security credentials for the ‘non-person’

By combining a hardware security module and a client-side automated lookup of credentials, agencies can extend authorized network access to non-person entities.

Cybersecurity

How phishing can lead to a shipment of headaches

Phishing emails made to look as though they originate from UPS, FedEx and DHL are flying under the radar of many email detection services and might even fool well-trained IT and cybersecurity professionals.

Cybersecurity

Coronavirus cyber hygiene and the IT manager’s responsibility

Until good cyber hygiene practices are truly ingrained in workers’ approach to how they use their devices, IT managers must show the way

Cybersecurity

Voting in the pandemic: Why mobile applications are not the answer – yet

It’s absolutely time to re-evaluate our current voting systems and take advantage of the internet, but we do not yet have the capability to lock down voting applications.

Cybersecurity

Voting problems turn the spotlight on confidential data

Large voter turnouts, user errors, untested technology, faulty apps and the cache of voters’ hacker-tempting personally identifiable information continue make the encryption of personally identifiable information is all the more important.

Cybersecurity

A two-pronged strategy for IoT security awareness

Besides addressing address how employees interact with internet-enabled devices, agencies must ensure their IoT technology partners across the supply chain follow best practices.