Federal Blueprint Blog

Anonymous's picture

Join Blue Coat’s Federal CTO, Aubrey Merchant, and other leaders from industry and government at the AFCEA Washington, DC Chapter’s Cybersecurity Summit on October 11. Aubrey will participate on a panel discussing Evolving Vulnerabilities within the DOD, which will offer insights on how to be vigilant and resilient in the face of cyber threats.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

One in 10 files shared broadly by employees via cloud file sharing applications contain data that is sensitive and/or subject to compliance regulations, according to 2015 Shadow Data Report from Elastica. What can agencies do to control shadow IT in order to protect data, but enable innovation?

Anonymous's picture
Written by
Federal BluePrint Editorial Team

While the second Federal Information Technology Acquisition Reform Act (FITARA) scorecard released in March showed an improvement in scores across agencies, it also showed there is much more work to be done.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Agencies are moving users to the cloud, but how can they streamline the process? How can it be simplified to create an enhanced user experience?

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Use of Secure Sockets Layer (SSL)/Transport Layer Security (TLS) encryption is estimated at 15-25 percent of all network traffic, and growing at 20 percent annually. Some industries, such as Federal, finance, and healthcare, have 70-80 percent of their traffic encrypted.

Anonymous's picture
Written by
Federal BluePrint Editorial Team

Initially, threat classification focused only on malware or botnets – leaving the majority of web traffic unrated, and agencies exposed to vulnerabilities. The unrated information quickly became a problem as the threat landscape continued to change – new threats emerged, more data collected, complex technologies introduced.