As we continue to take a look at how U.S. government agencies are meeting their cyber security challenges during the 11th Annual National Cyber Security Awareness Month (NCSAM), we are…
Read More

U.S. government agencies whether federal, state, or local, are under constant attack from nation-state actors, criminals, and hacktivists all in search of information valuable to their cause.  A recent GAO…
Read More

Click the infographic to view full-size version According to the U.S. Computer Emergency Readiness Team (US-CERT), in 2013, federal agencies were the target of 46,160 cyber attacks – an increase…
Read More

National Cyber Security Awareness Month (NCSAM), celebrated every October since its inception in 2004, was created as a collaborative effort between the Department of Homeland Security (DHS) and the National…
Read More

The recent GEOINT 2013* Symposium, which took place in mid-April, was a great opportunity for government agencies and industry representatives  to share ideas and best practices, according to Greg Gardner,…
Read More

GovDataDownload is very pleased to share this background interview with the Department of Homeland Security. These answers were furnished by DHS staff in the Office of Cybersecurity and Communications. Recently…
Read More

If you work in IT for the Department of Homeland Security, the past couple of months have been pretty hectic. It has been full steam ahead on a number of…
Read More

One of the most interesting trends in cyber security is the emergence of partnerships between government agencies, as well as between government agencies and private companies.  This trend towards information…
Read More

Cybersecurity; it’s probably the most commonly used term in IT.  Everyone, particularly federal agency IT leaders, know they need robust cybersecurity measures to protect sensitive data, like personally identifiable information…
Read More

By Kevin Hall, Minister of Defense Against the Dark Arts, Clearshark In the past, creating security around the perimeter of your network – a Maginot Line around your data –…
Read More