Remove Information Security Remove Mobile Remove Network Remove Report
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

GovLoop Releases Report: Winning the Cybersecurity Battle

CTOvision

By Pat Fiorenza As part of the Agency of the Future Series, GovLoop has released the report, “ Winning the Cybersecurity Battle. As a nation, we must work collaboratively to ensure that cyber defense strategies are robust and effective to secure our way of life. You can read the report online or can download a PDF here.

Report 193
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

Tech Moves: Startup Haven grows team to lead new fund; PSL promotions; F5 Networks adds execs

GeekWire

Mehta joined PSL in 2018 from ExtraHop Networks, where she was CFO. F5 Networks Photos). — F5 Networks hired Microsoft CVP Yvette Smith as SVP of customer success and business transformation and promoted Gail Coury to SVP and chief information security officer. He joined PSL in 2015 as chief design officer.

Network 99
article thumbnail

Fed Tech Roundup November 23

CTOvision

The Megatrend of Mobility: An update for technology decision-makers. Arctic Slope Regional Corporation Federal (ASRC) Acquires Data Networks Corporation (DNC). ATARC Releases IoT Report on Emerging Technology Issues. IG: State lax on information security - FCW.com. Wrestling Inc.

IBM 150
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

NASA says some of these incidents would have gone unnoticed before, but a new cybersecurity solution is finally giving the agency much-needed visibility across its networks. 6 key areas where NASA's information security is failing. NASA cyber threats: insiders, third-parties, nation-states.

article thumbnail

Pay for in-demand IT skills rises fastest in 14 years

CIO Business Intelligence

Other skills with fast-rising premiums included WebSphere MQ, Apache Ant, Azure Cosmos DB, DataRobot enterprise AI platform, Tibco BusinessWorks, RedHat OpenShift, Microsoft’s System Center Virtual Machine Manager and SharePoint Server, mobile operating systems, and a clutch of SAP technologies.

SAP 126