A vertical community of Federal cyber security leaders, project managers, industry, and government IT community stakeholders focused on public-private collaboration and best-practice exchange.
During 2015, federal departments collectively reported 77,183 cybersecurity incidents, a 10 percent increase from 2014. Looking ahead, cyberrisks and attacks are rapidly increasing and evolving. In short, more clearly than ever, cybersecurity is everyone’s priority. Despite these increases, however, there does seem to be a silver lining: government is getting better and more capable at […]
F or years, security providers have offered point tools to protect computer networks in distinct ways such as firewalls, intrusion prevention systems (IPS), and anti-virus (AV) software. This piecemeal approach is not working. Conventional security tools were built for yesterday’s simpler threats, and they leave major gaps in organizations’ “attack surface.” […]
The average cyber threat lives undetected on a network for an average of 201 days, with each identified breach costing agencies an estimated $4 million . But the damage goes beyond the direct financial and security costs of compromised data and systems—public confidence suffers as well. […]
This paper provides insight to how Tenable addresses the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF), which calls for “a set of industry standards and best practices to help organizations manage cybersecurity risks.” […]
Microsoft invests more than a billion dollars in security research and development every year, and security is a paramount focus in all that we do. We have built our products and services, with security inherent in design, to include protections integrated across infrastructure, services and devices, and with open extensions that allow other security products to be included in our protective shield. […]
Complex government networks lead to performance and reliability issues as agencies deploy new technology. With small form factors and superior user interfaces, Belkin’s newly NIAP PP3.0 certified Secure KVM Switching solutions is the answer your agency has been looking for. […]
Agencies are transforming data management with unified systems that combine distributed storage and computation at limitless scale, for any amount of data and any type, and with powerful, flexible analytics, from batch processing to interactive SQL to full-text search. Yet to realize their full potential, these enterprise data hub architectures require authentication, authorization, audit, and data protection controls. […]