GCN

Share

GCN

 •  November 21

In recent years, cybersecurity professionals have been waging a war in which victories are elusive and fleeting. At the same time, the explosive growth in the number of connected devices -- from mobiles to the internet of things -- has driven the demand for faster software development, which increases the risk of having unknown vulnerabilities...

GCN

 •  November 17

When it comes to sharing information on cybersecurity threats and incident reporting, it's harder for small businesses to get access to the same intelligence that industry giants share internally and with the Department of Homeland Security. To address that need, the New Jersey Cybersecurity & Communications Integration Cell was established in 2015...

GCN

 •  November 8

As state governments continue to consolidate their IT operations to reduce costs, they are faced with disparate cybersecurity compliance requirements that impede their progress. These mandates -- and accompanying audits -- for individual agency IT environments' compliance with federal standards strains states' limited staff resources and...

GCN

 •  October 30

A new cybersecurity appliance prevents hackers from being able to conduct reconnaissance and move laterally within a network. Cryptonite’s CryptoniteNXT, which launched Oct. 26, is based on research funded by the Defense and Homeland Security departments into Moving Target Defense, which DHS defines as a way to increase complexity and uncertainty...

GCN

 •  October 19

Protecting agencies against cyber criminals can be a daunting task. The threats are constantly changing, the criminals are becoming more sophisticated and the attacks are growing ever more numerous. Many government chief information security officers have been left struggling to decide which security products represent the best use of their...

GCN

 •  September 29

Russian meddling in 2016 extended further than the interference with voting infrastructure, and the nation needs a strong strategy to counter Russia's sustained efforts to undermine the integrity of the vote, former Department of Homeland Security leaders told a congressional task force. States should consider the Russian probes and alleged...

GCN

 •  September 25

The Department of Homeland Security plans to stand up a federal dashboard next month that will provide cybersecurity data from agencies that have operating sensor networks and internal dashboards. This will be the next step in a years-long effort to implement continuous diagnostics and mitigation within the federal government, Jeanette Manfra, the...

GCN

 •  September 14

When it comes to the securing mobile computing, government agencies are challenged not only by traditional software vulnerabilities, but also by the number and types of services accessible through mobile apps. The Department of Homeland Security’s Science and Technology Directorate began taking an active role in validation and threat protection for...

GCN

 •  August 25

Recent headlines about cybersecurity threats tend to focus on the latest ransomware, implying that the worst threats are generated externally. Yet what typically goes unnoticed is a fundamental shortcoming in most agencies’ cybersecurity strategy. A determined attacker can and will get inside a network. The goal of the initial breach is to spread...

GCN

 •  August 23

For federal agencies, collecting and reporting cybersecurity metrics is nothing new. Under the Federal Information Security Modernization Act, agencies must collect and report technology-focused cybersecurity information every year. However, a notable change is here. Under President Donald Trump’s recently signed cybersecurity executive order,...