Fixing the Weakest Link in Cybersecurity: People
In the wake of massive computer advancements, why are humans still the ones being asked to generate, know and reveal passwords?
In the wake of massive computer advancements, why are humans still the ones being asked to generate, know and reveal passwords?
In 2017, hackers accessed the personal data of nearly half of the U.S. population. The data was taken from Equifax, a CRA.
Cybersecurity is critical in government, but defending against evolving threats is extremely difficult for agencies. In GovLoop’s recent online training, three experts discussed how to use threat hunting to better understand hackers targeting your agency and protect against them.
According to Frank Konieczny, Chief Technology Officer for the Air Force, there are three main objectives behind most malicious operations.
Here are a few “secrets” that you may not know about Information Security, which you can use to help you form a stronger alliance or prevent any missteps that could cause problems for the team.
It’s not every day the Department of Defense invites people to hack its networks with no fear of repercussion. But that’s exactly what they’ve done—and good for them.
One of the most pressing cybersecurity issues facing government is the ability to recruit and hire talented professionals. The FBI, for example, has 56 major field offices, 200 satellite offices and locations around the world. Each of those offices have a need for people with cyber skills and knowledge.
There is no shortage of information on the interwebs about the massive Office of Personnel and Management breach that left computer systems and data exposed to hackers. The hard part is cutting through the jargon and speculation to understand what happened and what this hack means for you, especially if you’re one of the 4Read… Read more »
When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »
Hacks are no laughing matter. The U.S. government and the American population have lost billions of dollars as a result of IT system hacks. The threats come from all angles – insiders, thieves, terrorists, and your run-of-the-mill bad guys. Cybersecurity is not just a national issue – it’s a national battle. And it’s certainly beenRead… Read more »