The challenge is clear—a well-thought-out and rigorous policy for Federal Government cybersecurity is in place, now it must be implemented and enforced. Time is not on our side; the next hack or the next serious incident due to the negligence of a government employee or contractor could happen tomorrow or the next day. It is time to get serious about Federal Government Cybersecurity.

Read More

Sometimes the meaning behind Memorial Day can get lost but for those who have served in the military, or have loved ones who have served, Memorial Day is more than…
Read More

As we look ahead to another year, there are a few areas of interest that stand out above the rest when it comes to government IT.  The security and integrity…
Read More

Today’s cyber security landscape is so different for public sector organizations they require unique strategies, including an analytics-driven response. “Prevention alone is not sufficient,” according to Ashok Sankar, Director of…
Read More

Almost three years ago, the Department of Defense embarked on an ambitious project to provide the highest standards of information security and resilience to military personnel.  The Joint Information Environment…
Read More

Cybersecurity – you can’t escape the criticality of the issue if you work in government IT. It’s become one of those terms that is instantly recognizable, yet at the same…
Read More

It’s hard to believe that 2014 is already coming to a close! It’s been a busy year in the world of government and education IT, and we’ve been fortunate to…
Read More

GovDataDownload is pleased to present a guest Q&A from Jean-Paul Bergeaux, CTO at SwishData. In the discussion below Jean-Paul discusses the evolution of public sector cybersecurity, the rise of Continuous…
Read More

As we continue to take a look at how U.S. government agencies are meeting their cyber security challenges during the 11th Annual National Cyber Security Awareness Month (NCSAM), we are…
Read More

U.S. government agencies whether federal, state, or local, are under constant attack from nation-state actors, criminals, and hacktivists all in search of information valuable to their cause.  A recent GAO…
Read More