Posts Tagged: Security

Managing Enterprise IT Data to Secure the Internet of Things

This interview is an excerpt from GovLoop’s recent guide, What the Internet of Things Means for the Public Sector, which explores insights and best practices into how government is using automated machine-to-machine transactions and implementing IoT in the public sector. The cyber world is a dangerous place. In a rapidly escalating environment of cyberthreats, obsolete devices, software beyondRead… Read more »

Keep Your Eye on IoT

The Internet of Things – it’s a phrase that sounds as ominous as it is ambiguous. Many of us have heard of the Internet of Things (IoT), but everyone seems to have a different understanding of exactly what it means. Is it hardware? Software? Sensors? Is it secure? Where is it being used? Self-driving cars,Read… Read more »

Data May be Open, but is it Secure?

“It would be false to say that people are happily sharing their data with us.” That’s how the Department of Defense’s Col. Bob Saxon explained his agency’s efforts to open up government data. For all of its potential benefits, open data also presents security risks to those providing the information. From loss of agency confidentiality,Read… Read more »

What HTTPS Everywhere Means for Federal Agencies

On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in theRead… Read more »

7 Ways You Might Not Know You’re Putting Your Agency at Risk

>> Want even more information about the OPM breach? Read our recent post, 12 Things You Should Know About the OPM Breach The recent Office of Personnel Management (OPM) data breach has everyone on edge. The personal information of approximately 4 million current and former federal employees may have been compromised by hackers. The OPM will be contactingRead… Read more »

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »