Cybersecurity is a perennial focus of government, but with a year of high profile cyber incidents behind us, a new federal mandate, and ongoing remote work, 2022 is shaping up…
Learn MoreUltimately, the job of the cybersecurity professional in higher ed is to “plan for the worst day,” as one cybersecurity expert recently noted during a Campus Technology leadership summit. But…
Learn MoreDepartment of Defense (DoD) personnel need secure digital access to government data and applications from their personal devices easily, at scale, and without risk of data loss and privacy breach.…
Learn MoreSome colleges and universities are poised to emerge from the pandemic stronger than they went in. In large part, they have used the last year to accelerate the adoption of…
Learn MoreIT professionals in K-12 school systems became heroes to their communities when their skills and resourcefulness turned on remote learning for nearly all. But while IT teams were enabling teaching…
Learn MoreFederal government law enforcement agencies need to protect sensitive data such as criminal records and investigations, biometrics, tax filings, security camera footage, and personnel records. Exposure of sensitive information can…
Learn MoreThis year’s report is all about changes. “The only thing that never changes is that everything changes.” said Louis L’Amour, the American novelist. Another way of expressing that sentiment is,…
Learn MoreFederal operations are becoming more distributed than ever before, and agencies must rely far more on cloud-based services and capabilities to keep pace. With VMware NSX solutions, CTG Federal can…
Learn MoreThe goal of this primer is to support United States Agency for International Development (USAID) Democracy, Human Rights, and Governance (DRG) personnel, as well as the broader DRG community, to…
Learn MoreThe National Security Strategy will position the United States and its allies and partners to build a digital ecosystem together, making it more easily and inherently defensible, resilient, and aligned…
Learn MoreThis paper will explore shortcomings of over-reliance on endpoint protection, and encourage supplementing with a robust network visibility-based security strategy.
Learn MoreNuclear power reactors produce 20% of our nation’s electricity. Ensuring the safety and security of these facilities is a top priority. Since the September 11, 2001 terrorist attacks, the Nuclear…
Learn MoreDue to growing cybersecurity infrastructure and increasingly sophisticated cybersecurity threats, continuous monitoring of information security systems through automation is the best way to accurately assess vulnerability across a complex threat…
Learn MoreFederal agencies and our nation’s critical infrastructures are dependent on technology systems to carry out fundamental operations and to process, maintain, and report vital information. The security of these systems…
Learn MoreBlack Kite provides the only standards-based cyber risk assessments that analyze your supply chain’s cybersecurity posture from three critical dimensions: technical, financial and compliance. In this paper, the Black Kite…
Learn More