Federal civilian agencies are increasingly realizing that the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program is the cybersecurity strategy of their future. As such, information technology (IT)...

Embedded systems must be secure, reliable and scalable. CGI has developed some draft standards to help ensure they will be.

This blog discusses the need for a single, end-to-end solution that provides a holistic approach to fighting financial crime

Laying the foundation for cybersecurity

Jim Menendez

Modernizing security sounds like a great goal, but the reality is, most organizations are still struggling with the basic elements of securing information and information assets. New tools and technologies...

Fight the insider threat with CDM and identity governance

Clay Goldwein
Clay Goldwein

This blog describes how Continuous Diagnostics and Mitigation solutions deployed in concert with a strong identity, credentials and access management program can identify and prevent both insider threats and outside...

Treating cybersecurity like workplace safety

Jim Menendez

Taking measures to protect employees from workplace accidents seems like an obvious need today, but that was not always the case. Less than half a century ago, there was no...

How to compete in the cybersecurity talent tug of war

Jim Menendez
Jim Menendez

Across business and technology media alike, I’ve seen frequent coverage of the hundreds of thousands of cybersecurity and IT security job openings that are not getting filled. By 2022, the...

The cyber times they are a-changing

Jim Menendez

There was a time when companies sought to avoid a security breach because of the impact it would have on their reputation. Executives often would rely on the security organization...