This blog is an excerpt from GovLoop’s recent industry perspective Investment in Custom Security Processing Units Pays off Huge Dividends for Federal Security.
Posts Tagged: encryption
This can be accomplished with data-centric security that protects data as it is captured, processed and stored across a variety of devices, operating systems, databases, platforms and applications.
Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwords… Read more »
The following post is an excerpt from GovLoop’s recent industry perspective, Protecting Your Data in the Cloud. In the brief, we examine the challenges of cybersecurity in multi-tenant cloud environments, and offer three steps to achieving data transparency and security. According to Sol Cates, Chief Security Officer at Vormetric, agencies must take three steps to… Read more »
Cyber security is a hot topic among the private and public sector, especially as the consumerization of IT continues to grow as a trend and business tool. And although the Cybersecurity Act of 2012 failed to become a law, the need for strong cyber security measures, particularly within the federal government, has not diminished. If… Read more »
Since user authentication is the front line of security, the stronger it is the better. In this article I want to discuss multi-factor authentication and why it is stronger than just a single factor. Proving your identity involves using one or more of three possible factors: • Knowledge (passwords, PINs, etc.)• Possession (driver’s license, token,… Read more »