Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
Insider Threat programs across all agencies must develop alongside technology, the GAO reports. However, the Department of Defense is making significant progress.
Read moreWayne Belk, co-director of the National Insider Threat Task Force, wants feds to know that insider threat programs are there to protect them, not to get them in trouble.
Defense information pro Paul DeMennato offers advice about protecting informational systems against insider threats. He said it’s more than keeping up to date on patches and monitoring files for human anomalies, it’s about getting your staff to buy in to a culture of protecting against insider attacks.
IBM has claimed 60 percent of all intrusions can be attributed to insider threat. Further, Information Week suggests that 95 percent of all organizations have employees who seek to bypass security controls.
The supplement to NIST’s digital identity guidelines could pave the way for agencies to adopt stronger multi-factor authentication methods.
Federal investigators have their hands full trying to spot all of the fraud schemes that cost the government billions of dollars every year.
Cyber risk management is vital for protecting the nation’s data assets from cyber adversaries. Yet the Government Accountability Office uncovered security gaps in risk management as the agency analyzed the effectiveness of the 2023 National…
A new audit looks at how one agency within the Department of Health and Human Services (HHS) manages its cloud computing assets.
NIST says the new updates are the result of data collection, technical analyses, customer interaction, redesign and development of the security requirements.
Government agencies are continually looking at new technologies that can impact mission priorities and enhance service delivery.
A CYBERCOM acquisition leader says she doesn’t want the command’s burgeoning buying program to be ‘stodgy and antiquated.’
Remember, strong data security isn’t a barrier. It’s a necessary — and cost-effective — bridge to a brighter future.