Author Archive
Brent Hansen
Brent Hansen is federal CTO of Thales Trusted Cyber Technologies.
Cybersecurity
4 steps to reducing ransomware damage
Access control and data encryption management is the most effective protection – not only from ransomware, but from insider threats, rogue processes, malware and more.
- By Brent Hansen
Cybersecurity
Data privacy demands a unified view across siloes
A cross-enterprise privacy solution improves workflow and allows the creation and implementation of unified data privacy policies, giving agencies a clear understanding of sensitive data.
- By Brent Hansen
Infrastructure
Preparing for the CDM dashboard: Big data and the cloud
Big data and analytics are empowering federal agencies to make decisions faster than ever, but the added capabilities require a more stringent cloud security and data protection strategy.
- By Brent Hansen
Cybersecurity
What can agencies do today to guard against hacks like SolarWinds?
By establishing strong supply chain risk management requirements and verifying all updates for critical networks and third-party software, agencies can better protect their networks against future incursions.
- By Brent Hansen
Infrastructure
Government file sharing: What IT managers should know
IT managers must ensure that their agency’s file sharing solution is effective for users while providing the assurance that critical data remains protected.
- By Brent Hansen
Cybersecurity
Security credentials for the ‘non-person’
By combining a hardware security module and a client-side automated lookup of credentials, agencies can extend authorized network access to non-person entities.
- By Dan Jeffers and Brent Hansen
Cybersecurity
How phishing can lead to a shipment of headaches
Phishing emails made to look as though they originate from UPS, FedEx and DHL are flying under the radar of many email detection services and might even fool well-trained IT and cybersecurity professionals.
- By Brent Hansen
Cybersecurity
Coronavirus cyber hygiene and the IT manager’s responsibility
Until good cyber hygiene practices are truly ingrained in workers’ approach to how they use their devices, IT managers must show the way
- By Joel Goldman and Brent Hansen
Cybersecurity
Voting in the pandemic: Why mobile applications are not the answer – yet
It’s absolutely time to re-evaluate our current voting systems and take advantage of the internet, but we do not yet have the capability to lock down voting applications.
- By Brent Hansen
Cybersecurity
Voting problems turn the spotlight on confidential data
Large voter turnouts, user errors, untested technology, faulty apps and the cache of voters’ hacker-tempting personally identifiable information continue make the encryption of personally identifiable information is all the more important.
- By Brent Hansen
Cybersecurity
A two-pronged strategy for IoT security awareness
Besides addressing address how employees interact with internet-enabled devices, agencies must ensure their IoT technology partners across the supply chain follow best practices.
- By Brent Hansen