Archive

Blog search

Category: Cybersecurity
photo

Data Protection Services

Posted on January 15, 2019
Category: Cybersecurity

It is more important than ever for organizations to protect their data and address compliance, without disrupting employee and company productivity. With GDPR, the California Privacy Act, and the Data Protection Act of 2018, organizations now have regulations that mandate how their data is secured. Every organization must take a serious look at how they are protecting their data and align their data protection and compliance strategy with government mandates.  Read More

photo

RSA Conference 2019

Posted on January 08, 2019
Category: Cybersecurity

As cyber attacks have become an ever present occurrence many agencies are still not prepared to prevent all threats. UNICOM Government together with Dell EMC will be showcasing our joint security solution at RSA 2019 that encompasses network and data center security solutions protect high value data and data center resources with threat defense, highly secure virtualization, segmentation and policy control.  Read More

photo

IT Modernization in the Trump Age

Posted on April 18, 2017
Category: Cybersecurity

The Federal government is losing billions of dollars each year funding legacy systems. A report from IDC Government Insights shows that some agencies allocate upwards of 90 percent of their IT budgets to operations and maintenance. And, in a recent MeriTalk article, the Government Accountability Office’s Head Gene Dodaro noted legacy IT systems pose a serious obstacle to cybersecurity best practices. The answer is clear: Modernization.  Read More

photo

Defense has always been a major issue for the U.S. government. Keeping the American people safe from threats both at home and abroad is vital, and this importance shows in the national budget. Out of the $1.1 trillion allocated in fiscal year 2015 discretionary spending, $598.5 billion went toward the military. That's 54 percent of the budget, clearly showing how important defense is to the U.S. government.  Read More

photo

Despite spending more on defense than any other country in the world, the U.S. is not safe from attack. Specifically, U.S. federal agencies are nowhere near prepared enough to hold back the onslaught of cyberattacks levied against the country every single day. In fact, government officials are beginning to realize the gravity of their current situation.  Read More

photo

The landscape of war has dramatically changed over the years. Putting boots on the ground is no longer the only option countries have in terms of subduing enemies, and this fact could make all the difference in the near future. Cyberwar is increasingly becoming a convenient and powerful tool, as it has the potential for disrupting communications, gaining intel and generally ruining a group's day. It should be no surprise that the U.S. as well as other nations are gearing up to use this method as a long-term strategy in accomplishing their goals.  Read More

photo

In order to help both private and public sector entities better protect themselves from hackers, malware and other threats, the Obama Administration recently created a new commission to help draft protection guidelines for organizations to follow. Officially dubbed the Commission on Enhancing National Cybersecurity, the non-partisan group features 12 veteran leaders from large enterprises, leading Silicon Valley firms and government agencies. This group is tasked with presenting Congress in December 2016 with tangible steps both public and private organizations can take to bolster cybersecurity and ensure more robust data protection.  Read More

photo

The state of government security is drastically shifting to have a larger focus on cyberspace than ever before. Federal organizations deflect threats from malware, ransomware and viruses on a daily basis, but the risks are becoming more dire as time passes. Malicious parties are advancing their tactics as quickly as security firms are upgrading their solutions to fend off threats. This volatile environment is leading to numerous breaches and more determination to protect sensitive information under federal domain.  Read More

photo

Humans will always be the weakest link when it comes to security. An agency can utilize top-tier encryption, employ the world's best cybersecurity experts and spend millions of dollars on its defenses, and all it takes for a hacker to gain access to private data is for someone in HR to fall for a social engineering attack.  Read More

photo

The growing concern of cyberattacks directed at government agencies cannot be ignored. However, foreign nations attempting to gain access to confidential U.S. data may not be the only issue at play here. Incidents of ransomware – a type of cyberattack that encrypts the users files and demands compensation before the person can regain access – are growing rapidly. What's more, it appears the hackers behind these attacks are becoming bolder every day. What does this malware mean for government agencies, and what can be done to stop it in its tracks?  Read More

photo

It's a pretty commonly held fact in the cybersecurity community that older systems are generally easier to exploit compared to newer ones. A lot of this has to do with the fact that hackers have simply had a lot of time to tool around with them, and therefore know where the vulnerabilities are. This is especially true for the U.S. government's aging IT infrastructure.  Read More

photo

US improving cyberwar capabilities

Posted on March 02, 2016
Category: Cybersecurity

The U.S. government is taking some major steps to increase its digital presence on the battlefield. Military-grade hackers launched an assault against ISIS recently, utilizing denial of service attacks as well as other techniques to overload their computer and cellular networks, according to Government Technology contributor W.J. Hennigan. This marks the first time a country has openly admitted to committing an act of cyberwar.  Read More

photo

The state of cyberwar

Posted on February 26, 2016
Category: Cybersecurity

As the Internet and similar technologies began to creep further into government operations, hacking became the go-to method for collecting intelligence about foreign entities. It was a lot easier than sending in a spy to figure out what other countries were up to, and it didn't involve risking anyone's life to do so. However, recent developments into what a country can do with a cyberattack have shown warfare itself might see a major overhaul due to the digital revolution.  Read More

photo

A cyberattack on a private institution that works with U.S. intelligence agencies has revealed yet another flaw in how many government officials view cybersecurity. The hack of Juniper Networks, which was announced Dec. 17, 2015, has resulted in a data breach that could contain encrypted correspondence of government agencies spanning more than three years.  Read More

photo

Yet another cyberattack has befallen the American government. This time, the Department of Justice was the main target of the hackers, who got away with the information of nearly 20,000 DoJ employees, according to The Guardian. What's more, the cybercriminals also gained access to data on roughly 9,000 employees of the Department of Homeland Security, posting the information on an encrypted website that The Guardian then investigated.  Read More

photo

In the wake of the infamous Office of Personnel Management data breach, government cybersecurity has arguably trumped every other concern when it comes to government technology services. Cloud computing and data center consolidation have both had their fair share of time in the spotlight in the past few months, but securing the immense quantity of sensitive data the federal agencies possess is still a top priority for government IT leaders. As such, feds have taken several key steps recently that underscore the importance of government cybersecurity.  Read More

photo

As federal IT infrastructure is overhauled – through means of cloud migration and other strategies – for the sake of cost efficiency and better systems and processes, one of the chief concerns among government agencies is cybersecurity. The array of cyberthreats to government agencies is well-documented. In fact, research from Control Risks has shown that government was the most highly targeted sector in the past year, accounting for 36 percent of all targeted attacks in 2015. Unfortunately, this is only the tip of a very large iceberg of cybersecurity woes for government organizations.  Read More

« Previous 1234 Next »

photo

Why federal IT modernization is a big deal

Posted on April 21, 2016 0 comments

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

White House creates new cybersecurity commission

Posted on April 15, 2016 0 comments
Category: Cybersecurity

In order to help both private and public sector entities better protect themselves from hackers, malware and other threats, the Obama Administration recently created a new commission to help draft protection guidelines for organizations to follow. Officially dubbed the Commission on Enhancing National Cybersecurity, the non-partisan group features 12 veteran leaders from large enterprises, leading Silicon Valley firms and government agencies. This group is tasked with presenting Congress in December 2016 with tangible steps both public and private organizations can take to bolster cybersecurity and ensure more robust data protection.  Read More

photo

Cloud computing has effectively taken over businesses in virtually every sector over the past few years. For government, the road to virtual platforms has been paved with roadblocks in the forms of security, budget and overall hesitance to change from tried-and-true solutions. Despite these challenges, many federal and local government organizations have adopted the cloud for their operations, and it's making a significant difference. Other agencies that aren't using the cloud are likely to start their journey to these platforms in the near future, and will begin reaping all the benefits the cloud can offer.  Read More

photo

Chatbots may be the next big thing in tech, and the technology could prove enormously beneficial in the public arena. Chatbots, although just known as bots for short, are a form of artificial intelligence, noted Hannah Francis, a Technology Reporter with the Sydney Morning Herald. A bot works by executing a command and formulating a particular response depending on what is typed in as the input.  Read More

photo

In order to help both private companies and public agencies better make sense of publicly-available data, a team of academics and consultants have teamed up to create a tool that visualizes and more effectively displays this information. The tool is called Data USA, and it provides a search engine-like interface to help interested parties learn more about locations, occupations, industries and more. The site also includes pre-made breakdowns to make it easy to determine everything from the highest earning jobs in real estate to the racial breakdown of poverty levels in Flint, Michigan. Data USA is still fairly new, so additional data and pre-made filters will likely continue to be added to it in the coming months and years.  Read More

photo

To help ensure mobile app developers don't run afoul of the law, a consortium of federal agencies recently created a tool that provides helpful guidance on health-related laws and compliance. The Mobile Health Apps Interactive Tool was created as a joint effort between the Federal Trade Commission, the Department of Health and Human Services, the Food and Drug Administration and the Office for Civil Rights. It is a simple, interactive checklist for those developing health-related apps to make sure their program is following various laws like the Health Insurance Portability and Accountability Act.  Read More

photo

Government cybersecurity incidents on the rise

Posted on April 07, 2016 0 comments
Category: Cybersecurity

The state of government security is drastically shifting to have a larger focus on cyberspace than ever before. Federal organizations deflect threats from malware, ransomware and viruses on a daily basis, but the risks are becoming more dire as time passes. Malicious parties are advancing their tactics as quickly as security firms are upgrading their solutions to fend off threats. This volatile environment is leading to numerous breaches and more determination to protect sensitive information under federal domain.  Read More

photo

White House embraces open source coding

Posted on April 07, 2016 0 comments

As part of a broader effort to boost innovation and reduce costs across the board, the White House recently announced a new initiative that will make the code for all federal government software open sourced and available to everyone. In a late March blog post announcing the initiative, federal CIO Tony Scott said that going forward, all software that is designed or used only by federal agencies must have its source code be freely available. This will enable innovation, he said, by allowing a wider variety of parties to tinker and improve on government software. It also aligns federal government IT efforts more closely with private sector best practices. Plus, it hopefully eliminates the need to have to purchase multiple software licenses for different agencies, helping to streamline costs across the board.  Read More

photo

There are certain situations where going it alone isn't the best option. Asking for help from an expert can often solve a problem more effectively, and this is nowhere more apparent than within government IT. Agencies should know that partnering with knowledgeable outside companies isn't a sign of giving up on the problem. Rather, it shows that officials care enough to get the best person possible to help solve the issue in the most effective and efficient way possible. In that vein, let's look at some of the agencies who've teamed up with private companies recently.  Read More

photo

Humans will always be the weakest link when it comes to security. An agency can utilize top-tier encryption, employ the world's best cybersecurity experts and spend millions of dollars on its defenses, and all it takes for a hacker to gain access to private data is for someone in HR to fall for a social engineering attack.  Read More