It would be a mistake to move control of public-private cybersecurity relations from a civilian agency to the Department of Defense, as called for in a recent executive order draft, experts told members of Congress. […]
When government agencies face a network breach, having a planned response protocol in place can make all the difference, according to industry experts. “The first thing that they have to do is they have to really take a hard look at their incident response protocol,” said Rob Potter, vice president of public sector at Symantec. He […] […]
This just in, a threat has surfaced on an agency network. Can it be stopped in time? Continuous Diagnostics and Mitigation (CDM) combined with Symantec + Blue Coat’s security platform enables real-time threat detection, allowing agencies to mitigate and address any risks.
Agencies need visibility into their networks, control over user access, and protection of their boundaries as part of CDM.[…]
The increasing sophistication of cyberattacks and the emerging threat of ransomware are placing a new premium not only on high-level technical skills but on bold, effective leadership. “Each day, the cyber threat landscape changes, and our attackers are unrelenting,” said Rob Potter, vice president of the Americas for Symantec.[…]
The 2016 Symantec Government Symposium is coming up on Aug. 30, and its Cyber Awards deadline is June 1. The Cyber Awards recognize individuals who show excellence and leadership in government cybersecurity through individual contributions to programs that protect critical data and systems.[…]
Cyber criminal attack groups have increased their skills, staff, and resources in the past year, making their capabilities close to those of nation-state attackers, according to Symantec’s 2016 Internet Security Threat Report . It provides an overview and analysis of the past year in global threat activity, including emerging trends in attacks, malicious code activity, phishing, and spam.[…]