What Tops CIO Priority Lists?
Have you ever wondered what your Chief Information Officer is thinking about all day? What keeps them up at night? What makes them excited to go to work? What makes them want to pull their hair out? We found out.
Have you ever wondered what your Chief Information Officer is thinking about all day? What keeps them up at night? What makes them excited to go to work? What makes them want to pull their hair out? We found out.
Security or convenience is no longer an acceptable trade-off when it comes to cybersecurity. They must be mutually inclusive, otherwise employees will circumvent security for their own personal convenience. NIST and Microsoft understands this to a degree, but in the latest NIST Password Guidelines SP 800-63-3 the recommendations favors password convenience over password security.
Don’t kill passwords because the industry is confused between password authentication and password management.
California is the king of innovation, from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it’s not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003.
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
Generally, the cost of the Vulnerability Scanners may be out of your budget constraints, but there are many free options available. Here are five free Network Security Vulnerability Scanners.
Think of SecOps as a management approach that bridges the gap to connect security and operations teams, in much the same way that DevOps unifies software developers and operations professionals.
One significant issue has failed to gain traction in our national dialogue, even as its importance amplifies: Cybersecurity.
By: John W. Lainhart and Christopher Ballister In early 2015, George Washington University established the Center for Cyber and Homeland Security (CCHS) – a nonpartisan “think and do” tank. CCHS’ mission is to carry out policy-relevant research and analysis on cybersecurity, homeland security and counterterrorism issues. By bringing together domestic and international policymakers and practitionersRead… Read more »
What does it take to protect your agency’s network? Here are the five things you need to in place to avoid becoming the next ransomware casualty.