Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. But perhaps it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
There are consequences of cutting back or...
Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. Michael Campbell of Privoro says it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
National security, cyber incident response, and cyber security risk management experts analyze the current state of fraud within political campaigns. This includes current challenges campaigns are facing and how best to address those challenges. Join experts from the US CyberDome to learn how to ensure free speech...
Although many governments have adopted "Cloud First" strategies with respect to their modernization efforts, are they transitioning to the cloud using "Cloud Smart" strategies? Recent findings from the 2019 Unisys Cloud Success Barometer survey shows that 23% of government have embraced multi-cloud solutions,...
Watch this brief video interview to learn more about how the city of Westland achieved their security goals by harnessing AI to gain the most real-time visibility into their environment.
Entrusted with protecting the personal information of their residents, with securing critical infrastructure, and with overseeing fair elections, local governments face few challenges more pivotal than cyber security. Yet most cities and counties rely on an outdated approach to defending their networks: relying on...
While the modern organization embraces digital technology, it is also at risk of cyberattacks. In this guide, The Essential Guide to Security, we map out how agencies can use machine data for specific use cases and get started addressing threats and security challenges.
While the modern enterprise embraces digital...
The journey to modernization has its challenges, including an increase in events that are more difficult to monitor due to a diverse hybrid cloud/legacy infrastructure. Real-time IT monitoring tools lead to earlier detection and fewer critical events that could place an agency's mission at risk.
Download the...
The shift to digital transformation and new technologies increases what can be the biggest risk to your mission: a lack of real-time, end-to-end visibility into systems and operations. Individual department goals lead to a heterogenous landfill of products and systems managed in silos, challenging visibility and...
Choosing the right platform to build your agency's security operations center is arguably more important than choosing any point security product. But are you aware of the criteria you should consider when evaluating which Security Orchestration, Automation and Response (SOAR) platform to choose?
Download the...
One of the biggest challenges facing IT ops in agencies today is the lack of visibility across the entire infrastructure.
Download this report by Gartner to learn the four-step approach to developing an IT operations monitoring strategy.
Unused or unmonitored SSH keys grant alarming levels of privileged access beyond users, proliferating into your machine-to-machine communications and services. Learn how securing your SSH inventory beyond your PAM solution helps compliance with NIST, FISMA, and CDM along with five steps you can take today to...
The complexity of information technology and the constantly evolving threat landscape makes implementing appropriate controls and processes to secure information assets a major challenge for most enterprises in and out of government. The number of vulnerabilities organizations face is mindboggling: the National...
Snowden proved you can't trust on the inside. OPM proved you can't trust the outside. Who should you trust when it comes to your data? No one! In this provocative and informative presentation, retired Brigadier General Greg Touhill, the first Chief Information Security Officer of the U.S. government and current...
In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.