Federal Blueprint Blog

Anonymous's picture
Written by
Federal BluePrint Editorial Team

The move to cloud continues.  According to a MeriTalk report, 66 percent of Feds believe their agency needs to move IT services to the cloud faster to meet mission and constituent needs.  Seventy percent say increasing their cloud adoption pace will improve IT’s ability to innovate.

So how do we get there?

Blue Coat recently acquired Perspecsys Inc., a California-based enterprise cloud data protection solutions provider to help Federal customers stay secure as they make their move.

David Rubal's picture
Written by
David Rubal

Most Federal government agencies are entrusted with sensitive data that must be processed and interpreted in order to serve citizens and complete their missions. Whether this data is Personally Identifiable Information (PII) associated with citizens, government employees or sensitive information that is governed by one or more compliance functions that oversee treatment of data, strict policies are required to ensure information is adequately protected.

Aubrey Merchant-Dest's picture
Written by
Aubrey Merchant-Dest

You may have read or heard about FBI Director Comey’s plea to the Senate Intelligence Committee for a mechanism for break and inspect capability for communications of applications providing end-to-end encryption.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Encryption remains one of the leading technology issues debated in Washington, D.C. and beyond.

Edward Snowden ignited the controversy over the privacy of communications when he exposed the National Security Agency surveillance programs, and the encryption debate has escalated over the past nine months.

David Rubal's picture
Written by
David Rubal

Email is one of the most common attack vectors used by hackers to get into government networks. The well-publicized, late 2014 attack on the US State Department is the latest notable example of purposeful attacks on email systems to obtain sensitive content and user’s Personally Identifiable Information (PII). In early 2015, it was revealed that the infiltration extended to White House and other agency email systems.

Here, hackers send targeted communications or “phish” for information they can use to perpetrate other attacks and establish a foothold in an agency. They may try to trick users into providing personal data – such as usernames and passwords, sensitive data, records, etc. – or entice them to click on a link or open a file that contains malicious code that automatically infects the endpoint.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Are you watching the World Cup?

It’s great to see how the best players in the world work together on defense to shut down their opponents. Cybersecurity is the same way. All the pieces have to work together in order to have a strong defense.

Encrypted Traffic – Seeing Downfield