Data-Centric Security: Myths and Reality… Guidance for Federal Adoption

Data-Centric Security: Myths and Reality… Guidance for Federal Adoption

Over the last few years, the OPM breach and other attacks on federal government and commercial information systems have captured the attention of officials and lawmakers. These cyberattacks have created a shift in thinking throughout the public sector, and the expectation now is that all agencies have already been breached; ... Read More
encryption

The Key to Encryption: Simple for Government Leaders; Difficult for Attackers

Over the last few decades, the U.S. government created more than 100,000 custom digital applications. These apps continue to serve different purposes and live at different levels within the government — spanning teams, departments, organizations and even entire agencies. At a federal level, the government manages terabytes of both anonymized ... Read More