Why Not Just Isolate the Critical Stuff?
Lots of people are talking about the “Internet of Things” and what it means to the Internet’s future. Not a...
Other content in this Stream
Innovating in an age of change: A Q&A with Angela Heise
As president of our Civil group, Heise leads a team that is helping shape the infrastructure of the future for public and private sector organizations serving important missions.
Enterprise IT Overview
Leidos is a recognized leader in enterprise IT modernization. We take a user-centric approach to enterprise IT modernization that focuses on the user and the mission first and foremost.
OES Distinguished Technical Achievement Award: 'Icing on the cake' for Dr. Peter Mikhalevsky
A senior scientist with Leidos, Dr. Mikhalevsky received the Institute of Electrical and Electronics Engineers' Oceanic Engineering Society's DTA award. Learn more about his 45-year career in our Q&A.
The Cyber Workforce, Part 5: What does success look like?
Over the course of this series, we've discussed the need for more cybersecurity professionals and how we must look for new talent to build dynamic teams. But what does success look like?
Dos and don’ts for building an effective ICS security program
For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is...
The Cyber Workforce, Part 4: Successful candidates aren't one-size-fits-all
Even though it’s a highly technical field in many aspects, cybersecurity has several elements that lend themselves toward people from many different backgrounds.
The Cyber Workforce, Part 3: Striving for cognitive diversity
Too often, the cyber industry exhibits a recruiting bias toward computer science or engineering majors for careers in cybersecurity. As a result, we almost immediately lose diversity of thought.
Biometric solutions for an identity-driven world
Learn what individuals can do more securely and efficiently with biometric solutions. Biometric matching – verifying a person's identity through unique biological characteristics.
[Part 4 of 4] Why Training and Consequence Management Matter to Insider Risk Programs
Discover why the best insider risk programs incorporate training, awareness, and defined consequence management procedures to ensure success.
Top 5 Considerations for an Affiliate Healthcare Partnership
A successful affiliate program doesn’t happen at the press of a button, but what are the 5 key considerations for this critical investment?
India's Aadhaar program a foundation for others to follow
Biometric ID systems can serve as a proof of identity while also protecting privacy. Learn more about India's nationwide Aadhaar digital identity project.
Security and efficiency: You don't have to choose
Every mode of travel that involves leaving one country to enter another poses an inherent challenge to governments: Make sure that everyone who crosses their border is in fact who they say they are.
Why biometrics matter in international travel
Verifying the identity of travelers is crucial to public safety and security. Adding biometrics is an accepted way to mitigate forgery and manual error making travel safer for all.
The Cyber Workforce, Part 2: How we build capacity
Finding, building, hiring, retaining, and energizing our workforce has become one of the most challenging tasks in the cyber domain.
[Part 3 of 4] What Deserves the Greatest Protection
Successful insider risk programs begin with good choices—prioritizing what to protect and how to protect it. Part 3: Successful insider risk programs begin with good choices—prioritizing wha
[Part 2 of 4] Set the foundation for your insider risk program success
Part 2: Communication and documentation contribute to building a successful insider risk program. When implementing an insider risk program, it is necessary to take foundational...
Balancing the need for cybersecurity with the desire for innovation
We all recognize the need to protect organizations from cybercrime, but does that have an adverse impact on our ability to strive for innovation?
The ITIL barrier to DevOps success
The DevOps movement has renewed excitement in the IT industry and began bridging the expectation gap between business, development and IT infrastructure teams.
[Part 1 of 4] How to kick-off your insider risk program
Part 1: Review the first two of eight components to building a successful insider risk detection program that goes beyond network monitoring.
The Cyber Workforce, Part 1: Where we are and where we need to be