cybersecurity

August 2, 2018

GOVERNMENT

CDM: the new driver of cybersecurity and IT modernization

Recently, I had the opportunity to join many of my industry, agency, and Capitol Hill colleagues at the U.S. Capitol to discuss the Department of Homeland Security’s ongoing Continuous Diagnostics and Mitigation (CDM) program. As the CDM program enters Phase 3, it is refreshing to witness the broad…

July 9, 2018

SECURITY

Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports

As organizations navigate the rapid and constant change of digital transformation, they look for vendors who can deliver and partners they can trust to guide them on the journey. Transparency is undoubtedly one of the most critical aspects to building customer relationships and trust in the digital…

June 28, 2018

GOVERNMENT

The big myth about security patch management

“If we had just kept our systems patched, the malware wouldn’t have been a problem.” After every major breach you usually hear those words echoed across news media. You might even pause for a moment and tell yourself that if the victims had just patched their systems, they would have bee…

June 26, 2018

NETWORKING

A Security Fabric for the Internet of Things

What’s Really Out There in IoT Cyberspace? Do you know what is connected to your network right now? If you don’t, your network is vulnerable to attacks you might never see coming. You can’t protect what you don’t know exists. You’re in good company if you’re mistaken about what’s connecting to…

June 21, 2018

GOVERNMENT

What’s all the buzz about integrated, threat-driven CDM?

The rollout of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program has been a game changer for government agencies. And whether you realize it or not, you’re just getting to the good part. As you leave Phases 1 and 2 behind (who and what is on the network)…

Cisco Stealthwatch: Security Analytics Services without upfront cost or risk

  As cybersecurity becomes more complex and demand grows for knowledgeable security staff, organizations will look for more ways to maximize their security budgets. One way to do so is to outsource security functions to a service provider. According to the Cisco 2018 Annual Cybersecurity Report…

Do you Trust your IoT Device and its Vendor?

Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture? Do they communicate important actions you need to take and are committed to conducting business at the highest standards? If you have not asked y…

June 5, 2018

SECURITY

Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?

Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet, how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into your infrastructure and multi factor authentication for your Admins? Would you encrypt everything? VPN…

May 31, 2018

EDUCATION

Summer reading list: modernizing IT and enhancing cybersecurity, plus a view of the bright side

When my children were younger, the first sign of summer—besides the longer days and warmer temperatures—was our annual trip to our local bookstore. We (me included!) always came home from these jaunts with arms full of books. A few were from their school’s ubiquitous “summer reading” list, but many…