How to Play Your Role in Cybersecurity

January 10, 2018

For many agencies, cloud computing is a vital component of their IT strategy because it provides the flexibility and scalability government needs to meet modern technology demands. But while there are significant benefits of the cloud, agencies must be careful not to sacrifice security during cloud migration. To learn how organizations leverage the flexibility of cloud without decreasing their security posture, GovLoop sat down with Felipe Fernandez, Director of Systems Engineering at Fortinet Federal. Fortinet Federal provides solutions and services to help agencies build robust cybersecurity.

Spotlight

Nuspire

Nuspire is a state-of-the-science managed network security service provider with more than a decade of industry experience providing services for some of the largest and most distinctive companies in the world. Nuspire is a true managed service provider that has moved beyond simple firewall maintenance and IDS monitoring to take responsibility for customer networks by using powerful custom built: management and monitoring tools, IPS, in-line AV and anti-spyware, URL filtering, and content aware firewalling.

OTHER WHITEPAPERS
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

Embracing Security Operations in the Educational Sector

whitePaper | December 22, 2022

Nearly every part of the educational sector has fallen victim to a cyberattack, from elementary schools to universities. Securing education is no longer a “nice to have” but a “must do” and is a growing concern among the global educational community. Creating and maintaining effective information security and cybersecurity operations in education comes down to people, processes, and tools. It’s crucial for IT and security leaders across the entire spectrum of educational institutions to find the right balance between the three. While there are success stories of achieving that balance, there’s always more to do to identify, understand, and mitigate cybersecurity risks to these organizations. Establishing and improving existing cybersecurity operations must become a priority.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

Nasuni Access Anywhere Security Model

whitePaper | December 20, 2022

The Nasuni Access Anywhere add-on service delivers high-performance, VPN-less file access for remote and hybrid users, integrates an organization’s file shares with Microsoft Teams, and provides productivity tools such as desktop synchronization and external file and folder sharing to enhance user productivity and provide access to files seamlessly from anywhere on any device. This white paper outlines the security elements of the Nasuni Access Anywhere service.

Read More
news image

Autodesk® Fusion 360 Security Whitepaper

whitePaper | October 27, 2022

Autodesk® Fusion 360™ is the first 3D CAD, CAM, and CAE tool of its kind. It connects your product development process in a single cloud-based platform that works on both Mac and PC. The Fusion 360 tools enable fast and easy exploration of design ideas with a secure and integrated concept-to-fabrication toolset that extends to include web browsers and mobile devices.

Read More

Spotlight

Nuspire

Nuspire is a state-of-the-science managed network security service provider with more than a decade of industry experience providing services for some of the largest and most distinctive companies in the world. Nuspire is a true managed service provider that has moved beyond simple firewall maintenance and IDS monitoring to take responsibility for customer networks by using powerful custom built: management and monitoring tools, IPS, in-line AV and anti-spyware, URL filtering, and content aware firewalling.

Events