Profile cover photo
Profile photo
Interos Solutions
5 followers
5 followers
About
Posts

Post has attachment
Happy Holidays from our family to yours!
Photo
Add a comment...

Post has attachment
On Nov. 21, the Senate Appropriations Committee released a draft funding bill for the Department of Homeland Security. The bill delves into a range of cybersecurity and technology issues confronting DHS and makes it clear that Congress views protecting federal information systems as one of the department's top priorities for 2018.
"The bill … recommends an unprecedented level of investment in cybersecurity," the committee wrote in its explanatory statement accompanying the bill.
(This) comes in for $700 million for cybersecurity operations for 2018 -- a boost of approximately $27 million over 2017 levels -- out of a total $1.4 billion budget. http://ow.ly/1qNN30hbRU3
Add a comment...

Post has attachment
Four ways state and local CIOs can boost cybersecurity - Tanium Security Director Andre McGregor draws on his experience with the FBI to lend state and local government tech teams advice for keeping their networks and data secure in an interview with StateScoop. http://ow.ly/igce30h9NUV
Add a comment...

Post has attachment
Since the notion of supply chain management emerged in the 1800s, the focus has been on transporting parts, materials, and finished goods from point to point at the lowest cost. Companies are still trying hard to do that today, of course. But increasingly, other objectives are taking priority.
In particular, companies are using various digital technologies that, among other effects, eliminate certain supply chain activities and players. These steps may reduce costs, but their underlying purpose is to facilitate the creation of new business models based on other motivations, such as leveraging contemporary consumer buying preferences. http://ow.ly/amQV30h8vhf
Add a comment...

Post has attachment
When faced with escalating risks, it’s easy to get so focused on constructing walls of protection that we forget cybersecurity teams need to be just as skilled at building bridges. Even the most elaborate technology barriers will fail without bridges of communication and collaboration across your entire organization.
Considering the high-profile cybersecurity breaches of the past year, I believe one of the root causes -- and greatest risks -- is that security too often operates in a silo...it’s clear there is a disconnect between security and the rest of the organization. http://ow.ly/n8g530h5DUP
Add a comment...

Post has attachment
Is Donald Trump’s cybersecurity policy humming along at the 10-month mark of his administration, a rare space of continuity amid myriad shifts and realignments? Or is Trump blazing a new path that could set dangerous precedents in cyberspace and leave the internet more ungovernable in the future?
The answer, according to cyber analysts and former officials in Republican and Democratic administrations, might be both.
When it comes to basic management of the government’s cybersecurity responsibilities, they say, it might be difficult to distinguish Trump’s cybersecurity program from his predecessor’s. http://ow.ly/qFZM30h48LZ
Add a comment...

Post has attachment
A detailed review of hundreds of the most popular US federal websites shows that, year over year, most continue to fall short of security and technical requirements set by the federal government, as well as industry standards for web design and development.
According to the second edition of the Benchmarking US Government Websites report from the Information Technology and Innovation Foundation (ITIF), 91% of the 469 federal government websites reviewed fail at least one key performance measure, including one-third that fail on at least one important security measure. http://ow.ly/bZxY30h0zwr
Add a comment...

Post has attachment
How to better prepare your supply chain for the next extreme event-The destruction wrought by recent natural disasters in North America serves as a reminder of the value of having a supply chain disaster-recovery plan. http://ow.ly/KtN430gZ5Yg
Add a comment...

Post has attachment
Desperate for Cybersecurity Workers, States Help Build the Next Generation - Internships for veterans, cyber classes for high school and college students and mentoring programs — aimed especially at middle-school girls — are among the ways states are trying to beef up their cybersecurity ranks. http://ow.ly/kPdi30gTRZz
Add a comment...

Post has attachment
From Forbes:
The following list of 60 predictions starts with three general observations and moves to a wide range of cybersecurity topics: Attacks on the US government and critical infrastructure, determining authenticity in the age of fake news, consumer privacy and the GDPR, the Internet of Things (IoT), Artificial Intelligence (AI) as a new tool in the hands of both attackers and defenders, cryptocurrencies and biometrics, the deployment of enterprise IT and cybersecurity, and the persistent cybersecurity skills shortage. http://ow.ly/XJRD30gTRwt
Add a comment...
Wait while more posts are being loaded