Cyber Security Exchange

A vertical community of Federal cyber security leaders, project managers, industry, and government IT community stakeholders focused on public-private collaboration and best-practice exchange.

The average cyber threat lives undetected on a network for an average of 201 days, with each identified breach costing agencies an estimated $4 million . But the damage goes beyond the direct financial and security costs of compromised data and systems—public confidence suffers as well. […]

This paper provides insight to how Tenable addresses the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF), which calls for “a set of industry standards and best practices to help organizations manage cybersecurity risks.” […]

There are many things you could do to improve your security, but where should you invest your resources? Many organizations are turning to security frameworks for best practices and direction for improving their security program. […]

Microsoft invests more than a billion dollars in security research and development every year, and security is a paramount focus in all that we do. We have built our products and services, with security inherent in design, to include protections integrated across infrastructure, services and devices, and with open extensions that allow other security products to be included in our protective shield. […]

Complex government networks lead to performance and reliability issues as agencies deploy new technology. With small form factors and superior user interfaces, Belkin’s newly NIAP PP3.0 certified Secure KVM Switching solutions is the answer your agency has been looking for. […]

Agencies are transforming data management with unified systems that combine distributed storage and computation at limitless scale, for any amount of data and any type, and with powerful, flexible analytics, from batch processing to interactive SQL to full-text search. Yet to realize their full potential, these enterprise data hub architectures require authentication, authorization, audit, and data protection controls. […]

Subscribe

Want the latest on the Cyber Security Exchange? Sign up today.
  • This field is for validation purposes and should be left unchanged.