A CISO’s 365 Days Journey – Part 2
This is Part 2 of the four-part series about a Chief Information Security Officer’s initial 365 days. I will focus on and emphasize the importance of risk here.
This is Part 2 of the four-part series about a Chief Information Security Officer’s initial 365 days. I will focus on and emphasize the importance of risk here.
The national spotlight on personal security (PerSec) breaches and vulnerabilities isn’t likely to dim anytime soon. Using a case management solution that maps its workflows to federal and agency-specific guidelines maximizes efficiency.
Supervisors can ensure their teams remain as efficient as before and are properly supported at home through virtual communications platforms.
Discover the advantages and disadvantages of how you combine different factors. If you still think a password plus an SMS text code is MFA, you really need to read this article!
Before I can demonstrate the ultimate way to secure passwords and password management, I need to first discuss the truth about MFA.
This user experience envelope gets us closer and closer to seeing and understanding what our tax dollar investments are doing, how they’re going to work, and what they’re going to look like.
For better or worse, our bosses aren’t going to be around forever. Here are some tips for what to do when your boss leaves.
Community engagement is an important part of how governments interact with their constituents. Learn about identifying your community engagement efforts.
If you’re contemplating a role in government where you serve an elected official, or perhaps you’re already working for one, these helpful strategies wil help you navigate what can be tricky and unexpected waters.
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?