Why You Can’t Kill Off Passwords
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
Authentication factors don’t govern security; the authentication infrastructure determines security. So what’s with all the “killing passwords” talk?
While almost everyone loves to hate passwords, they are not the real problem.
Without securing authentication, you allow hackers to steal your intellectual property, steal your money and steal your customers’ personal information.
IoT provides a number of potential benefits for the federal space, but risks remain. There’s a long road ahead, but with stronger authentication methods, education and industry collaboration, the federal government could thrive in the IoT revolution.
The proliferation of access points has added to the problem of keeping information safe. Now data is being accessed from remote work centers and employees’ homes or positions in the field, plus mobile devices and more. Here are four main access points to watch out for.
At Tuesday’s GovLoop event, “Evolving Tactics to Combat the Cyber Threat,” govies kicked off the day by focusing on a critical strategy to better tackle cyber threats: interagency collaboration. Michael Garcia is the Acting Director of the National Strategy for Trusted Identities in Cyberspace (NSTIC) at the National Institute for Standards and Technology (NIST) underRead… Read more »
There was an article in Security Products recently that discussed Situational Awareness in a maritime environment. Due to the extreme number of ships both commercial and military that are on the seas at any one time, it is imperative that you have a way to quickly identify the target, assess the threat level, and actRead… Read more »
The future of the internet will involve more authentication than it does today but there might be a simple interim solution to provide some level of authentication for the Gov 2.0 presence on online social networks such as facebook and twitter. A standard policy of having a reciprocal link back to a facebook fan pageRead… Read more »