Cyber Security and Mobility Highest Priorities for Government

Lockheed Martin and its Cyber Security Alliance partners announced the results of a collaborative cyber security survey in a new white paper titled "Cyber Security and Transformational Technologies - Keeping Systems and Data Safe".

The survey found that 85% of government technology decision makers in federal, defense/military and intelligence agencies see cyber security as a high priority and currently have one or more major initiatives underway. This was followed to a lesser degree by mobile computing (39%), cloud computing (26%) and big data (27%).

The white paper describes and ranks the types of security threats agencies face and recommends preparedness strategies to effectively defend against these pressures. Threats include: malware, phishing, data leaks, misuse, hacking, spam, social, insider, cyber espionage, mobile and others.

While most agencies consider themselves "well prepared" to deal with security threats, they continue to invest in other new technologies because mobile device initiatives, cloud computing and big data solutions contribute to more economical and affordable approaches to sharing and storing information when compared to traditional methods that require additional cyber security measures to ensure protection.

"Government's challenge is two-fold, adopting transformational technologies to help reduce operating costs while also keeping systems and data safe. Our Lockheed Martin Cyber Security Alliance partners are keenly focused on collaboration and innovation to provide seamless end-to-end security with affordability in mind," said Rick Johnson, Vice President and Chief Technology Officer, Lockheed Martin Information Systems & Global Solutions.

The Lockheed Martin Cyber Security Alliance commissioned government market research firm Market Connections, Inc. to conduct an online survey of U.S. federal government, defense/military and intelligence agency technology decision makers. The survey measured awareness and attitudes about cloud computing, cyber security, mobility and big data topics. Survey results reflect input from respondents in all military branches and a variety of federal, state and local government agencies.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3