Don’t Kill Passwords: Build a Secure Infrastructure!
Don’t kill passwords because the industry is confused between password authentication and password management.
Don’t kill passwords because the industry is confused between password authentication and password management.
Knowing how to secure your agency’s networks in the current cyber landscape can be challenging. See what these cyber experts have to say and learn how you can apply their recommendations at your organization.
According to Jose Simonelli and Ian Tewksbury, Architects for Red Hat Consulting, shadow IT doesn’t have be a negative thing. In fact, embracing shadow IT can actually have a positive impact on your organization’s culture and processes.
External threats may be more sensational — the sophisticated hackers who troll our networks phishing for a way in are often the headline-grabbers — but for many federal network administrators, the biggest threat may be sitting right next to them.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. When you think of a Chief Information Security Officer’s (CISO) job description, you probably think of something like “establish business objectives while overseeing the protection of an organization’s technological assets.” It all sounds pretty straight forward. But if you talkRead… Read more »
Plans include providing more rotational job opportunities in and outside of government and creating a cyber track for the Presidential Management Fellows program.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. A flood of unstructured data is entering government, with no signs of slowing. This has serious implications on security as unstructured data gives less visibility to agencies, making them more vulnerable to cyberattacks. Additionally, agencies are struggling to gain controlRead… Read more »
To understand the best ways to secure agency networks, GovLoop spoke with Will Ash, Senior Director of U.S. Public Sector Security at Cisco, an industry leader in networking and cybersecurity.
This interview is an excerpt from GovLoop’s recent research guide, The Current State of Government’s Cybersecurity. Agencies continue to rapidly implement new security monitoring tools with the goal of identifying actions impacting security within each layer of their environment. This growth of management and monitoring tools has negatively impacted systems and application performance due to theRead… Read more »
Perhaps its time to consider a new approach that puts people at the center, or human-centered design (HCD).