3 Best Practices for Improved Network Security
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
This interview is an excerpt from GovLoop’s recent guide, What the Internet of Things Means for the Public Sector, which explores insights and best practices into how government is using automated machine-to-machine transactions and implementing IoT in the public sector. The cyber world is a dangerous place. In a rapidly escalating environment of cyberthreats, obsolete devices, software beyondRead… Read more »
Just a few years ago, the only security metric that mattered was whether your organization had been hacked or not. This all-or-nothing definition of security success is now outdated. There are new, more complex metrics that measure the strength of your security posture.
The Internet of Things – it’s a phrase that sounds as ominous as it is ambiguous. Many of us have heard of the Internet of Things (IoT), but everyone seems to have a different understanding of exactly what it means. Is it hardware? Software? Sensors? Is it secure? Where is it being used? Self-driving cars,Read… Read more »
“It would be false to say that people are happily sharing their data with us.” That’s how the Department of Defense’s Col. Bob Saxon explained his agency’s efforts to open up government data. For all of its potential benefits, open data also presents security risks to those providing the information. From loss of agency confidentiality,Read… Read more »
On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in theRead… Read more »
>> Want even more information about the OPM breach? Read our recent post, 12 Things You Should Know About the OPM Breach The recent Office of Personnel Management (OPM) data breach has everyone on edge. The personal information of approximately 4 million current and former federal employees may have been compromised by hackers. The OPM will be contactingRead… Read more »
This blog post is an excerpt from GovLoop’s recent guide, Forecasting the Cloud: Eight Ways the Technology is Changing Government. To download the full guide, head here. It’s widely agreed that 2014 was the year of the cloud in the federal government. More and more agencies and organizations tested moving data to the cloud, learnedRead… Read more »
When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »
There are many privacy and security compliances designed to protect customer and company data across a variety of industries. What do they mean exactly, and how can organizations secure their websites accordingly?