Posts Tagged: Security

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »

Mobile App Threats to Your Organization at the Code

In today’s computing environment, we have moved beyond the desktop and wired environment and into the mobile world. Our mobile devices are true computing platforms with their own operating systems and resources; yet we don’t often think about the computer we are carrying in our pocket. How safe are the applications we use? How secureRead… Read more »

Lessons Learned from the Nevada Department of Transportation

This post is an excerpt from GovLoop’s recent industry perspective. To read the full piece, click here. Splunk helps dozens of agencies combat cyberthreats. Here’s how the Nevada Department of Transportation (NDOT) uses it. Since 1917, NDOT has maintained, planned, constructed and operated the state’s highway system. Located in Carson City, the division employs moreRead… Read more »

The Top 5 Privacy and Security Laws you Should Know

Privacy and security are more important than ever, especially with the recent barrage of cyber attacks on companies like Anthem, Premera and Sony which compromised confidential data of millions of customers Privacy and security compliances are requirements that various organizations must follow to protect that same data. There are compliances that span across many industriesRead… Read more »

Security in the New IP – What’s Missing from Government’s Security Wish List?

There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when. According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personalRead… Read more »

A 360-Degree View of Defense Logistics

For most, the idea of logistics doesn’t reach much further than, say, planning for a dinner party. Call some people, get some groceries, and spruce up the apartment. In the world of defense logistics, however, your dinner party has now turned into the task of overseeing the manufacturing, distribution, storage, and upkeep of the productsRead… Read more »