Federal Blueprint Blog

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Some agencies had a rough 2015, and they’re eager to flip the calendar.

Last year we learned about the breach at the Office of Personnel Management that exposed the information of more than 22 million people. In February, hackers walked through the front door of the Internal Revenue Service’s website to steal the records of as many as 334,000 taxpayers.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

With the holidays upon us, it’s important to remember that ‘tis better to give than to receive.

But Federal agencies receive much more than they want. Hackers are delivering malware, spam, and phishing attacks, just to name a few. It’s enough to turn any CIO into a Grinch.

The Gift of Proxy

Anonymous's picture
Written by
Federal BluePrint Editorial Team

The Federal “Cloud First” policy and the Federal IT Acquisition Act (FITARA) are helping push Feds to the cloud, according to Rep. Will Hurd. While it has been a slow adoption to cloud, Feds are making progress with these initiatives.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Hide and seek was fun when we were kids.

But hackers are hiding malware in mobile apps, and that’s no fun.

Our new report, “Blue Coat Systems 2015 Mobile Malware Report,” illustrates the rapid growth of mobile malware. With mobility and Bring Your Own Device (BYOD) programs becoming increasingly common throughout Federal agencies and other organizations, this new report is required reading.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Building a house requires a lot of tools.

In the same way, organizations need many tools to succeed in their efforts to protect data and networks from hackers and cyber creeps who lurk in the shadows.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

National Cyber Security Awareness Month and Halloween are both in October. Coincidence? Maybe. But, Feds do have a lot to fear when it comes to cyber security.