Posts Tagged: cybersecurity

Cybersecurity: No More Rumors

Hacks are no laughing matter. The U.S. government and the American population have lost billions of dollars as a result of IT system hacks. The threats come from all angles – insiders, thieves, terrorists, and your run-of-the-mill bad guys. Cybersecurity is not just a national issue – it’s a national battle. And it’s certainly beenRead… Read more »

Say What? Congress Works Together for Cyber

Everyday, cyberthreats are growing in number and sophistication. As each new exploit is exposed, it leads one to wonder what else is vulnerable in the federal government’s vast network architecture. And with limited resources and trained personnel, it is increasingly difficult for government to keep up with the advanced capabilities of cyber adversaries. In response,Read… Read more »

Talking TECH: A Fresh Take on Cybersecurity

The state of cybersecurity is constantly evolving and growing in sophistication. Shouldn’t discussions about it be similarly innovative? If you’re looking for something different in your cybersecurity education and some fresh voices outside of the tech echo chamber, then you’ll be excited to learn about the 2015 Symantec Government Symposium – Secure Government: Manage, Mitigate,Read… Read more »

Cybersecurity Is Everyone’s Problem – Even Yours

When you hear about a cyber breach, you probably wonder if your credit card has been compromised. But that’s it. Unless you are in the security field, a cyberattack can often feel like someone else’s problem. And that feeling is true in the government as well. Don’t believe it? Check this out: cybersecurity policies areRead… Read more »

How to Bypass Your Best Computer Security System in Ten Minutes

In the time it takes you to read this short article, an intruder can create 3-5 user accounts within your business system. Social engineering is a technique hackers use to take over an account by persuading or psychologically manipulating people to divulge confidential information. This is usually the first step within a more complex scheme.Read… Read more »

The Tech Loop: Harder. Better. Faster. Stronger.

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include big data & analytics, cybersecurity, GIS, cloud, and IoT. Big Data & Analytics Oops, NIST did it again. Except in a good way. Following the wide and growing use of the NationalRead… Read more »

The Similarity of Passwords to Symmetric Key

By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first lineRead… Read more »

The Tech Loop: Fast & Furiously Data-Driven

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cybersecurity, big data & analytics, and cloud. Cybersecurity Sound the alarm! Or “pound the alarm,” as Nicki Minaj would say. In an executive order signed this week, President Obama declared foreign cyberthreatsRead… Read more »

Cyberspace: Asset or Liability?

Cyberthreats are a national emergency. That’s what President Obama declared in an executive order signed yesterday, that also authorized the levying of targeted sanctions against individuals or groups involved in malicious cyber activities aimed at the U.S. With this most recent action to address the growing cybersecurity challenge, it was especially timely to hear fromRead… Read more »