Four Ways DevSecOps Improves Application Security

Data breaches occur so frequently that it wouldn’t be surprising if the average American is becoming desensitized to them. It would be even less surprising if they’ve failed to notice that breaches are happening more frequently as cyberattacks increase in…

Why a new approach to encryption is essential for today’s government applications

Over the past decade, the role of software in the federal government has evolved from something that increased operational efficiency or made life easier, to completely mission-critical to agencies and military organizations. Software is key to federal digital transformation initiatives,…

Are government networks secure against cyber threats in 2020?

Last month was National Cybersecurity Awareness Month, which cyber professionals, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) claim is an opportunity to, “…raise awareness about the importance of cybersecurity across our Nation, ensuring…

Why AppSec is Essential for Today’s Software-Enabled Government

Software flaws remain some of the most exploited vulnerabilities by hackers and malicious actors. In fact, Forrester reports that vulnerable software and applications are the top cause of data breaches. Today, software is playing an increasingly mission-critical role across the…

The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Leveraging AI and ML to fight back against government cyber threats

This article was contributed by Carolyn Duby, the Solutions Architect and Cyber Security Lead at Cloudera.Gartner anticipates an estimated 300 percent growth in connected devices by 2020 sparked by faster 5G networks bringing an explosion of inexpensive, connected devices. While this…

Securing school networks in the age of COVID-19

We are in the midst of a dramatic global cultural change due to the COVID-19 pandemic. Online education and remote work environments that were once flexible options are now becoming the new normal — and demand is only increasing. Due…

Is the Twitter hack even worse than we think?

What do Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Elon Musk, Kanye and Kim Kardashian West and Warren Buffett all have in common? According to the New York Times and CNN, they were all victims of last week’s Twitter…

Navy Telework Capacity Gets a Trial by Fire During COVID19

Just like in workplaces and industries all across the country, the coronavirus pandemic has led to dramatic changes in how the military conducts its daily business and has forced the rapid and widespread adoption of remote work policies by hundreds…

Increasing application security in the DoD supply chain

In an attempt to improve the security of the Department of Defense (DoD) supply chain, the Pentagon recently released new cybersecurity standards for its contractors. While I’ll be taking a deeper dive into those standards in a future article, they…