Posts Tagged: cybersecurity

How to Bypass Your Best Computer Security System in Ten Minutes

In the time it takes you to read this short article, an intruder can create 3-5 user accounts within your business system. Social engineering is a technique hackers use to take over an account by persuading or psychologically manipulating people to divulge confidential information. This is usually the first step within a more complex scheme.Read… Read more »

The Tech Loop: Harder. Better. Faster. Stronger.

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include big data & analytics, cybersecurity, GIS, cloud, and IoT. Big Data & Analytics Oops, NIST did it again. Except in a good way. Following the wide and growing use of the NationalRead… Read more »

The Similarity of Passwords to Symmetric Key

By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first lineRead… Read more »

The Tech Loop: Fast & Furiously Data-Driven

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cybersecurity, big data & analytics, and cloud. Cybersecurity Sound the alarm! Or “pound the alarm,” as Nicki Minaj would say. In an executive order signed this week, President Obama declared foreign cyberthreatsRead… Read more »

Cyberspace: Asset or Liability?

Cyberthreats are a national emergency. That’s what President Obama declared in an executive order signed yesterday, that also authorized the levying of targeted sanctions against individuals or groups involved in malicious cyber activities aimed at the U.S. With this most recent action to address the growing cybersecurity challenge, it was especially timely to hear fromRead… Read more »

Creating an Adaptive Cybersecurity Strategy & Culture through Agile Cybersecurity Action Planning (ACAP)

Cybersecurity should not about just building better castles, but looking ahead to the emerging threats. Castles were undone by introduction of cannons and mobile warfare. This will likely be true of Cybersecurity because the “cyber barbarians,” whether state or non-state actors, criminals or hacktivists, are constantly looking for new technologies, human weakness, back doors and… Read more »

The Tech Loop: Hot Damn!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, GIS, cybersecurity, big data, and IoT. Cloud A cloud of doubt? According to Gartner, Inc., CIOs remain hesitant to consider cloud computing as a first-line option for IT projects. Most areRead… Read more »

Hillary’s Email Isn’t the Only Email Worry for State

Former Secretary of State Hillary Clinton’s email isn’t the only State Department email to make headlines in the past few months. In 2014, the State Department found themselves in a very difficult situation. State Department emails had been breached, presumably by Russian hackers. “The hackers bedeviled the State Department’s email system for much of theRead… Read more »

Insider Threats: The Stranger Next Door

Cybersecurity dialogues often talk about threats and breaches stemming from hackers, terrorists, and cyber-criminals. However, there are significant threats that come from individuals who are closer than you think – maybe even the person you sit next to at the office. SolarWinds, an IT management software company, recently researched insider threats to the federal government.Read… Read more »