Securing Your Unified Communications Infrastructure
Securing your unified communications (UC) infrastructure is one area of security that is often overlooked in favor of network and data security.
Securing your unified communications (UC) infrastructure is one area of security that is often overlooked in favor of network and data security.
Holistic protection for your entire IT infrastructure requires a comprehensive security plan for your network, data and a unified communications solution.
This interview is an excerpt from our recent guide, 30 Government Innovations That Mattered in 2015 which examines 30 government case studies that explore innovation at all levels of government. Innovations that spanned the government job spectrum from human resources to cybersecurity and back again. The largest cyber breach in the history of government sawRead… Read more »
Finding the balance between privacy and security has never been more of an issue than it is today — especially in the wake of the Internet of Things (IoT) technology, which allows machines to interact with each other through signaling systems. These machine interactions allow IoT to embrace a technological revolution unlike anything we’ve seenRead… Read more »
As a result of the need to do more with less and the need for increased security, we now have better technology. Now, people just need to start using it.
This interview is an excerpt from GovLoop’s recent guide, What the Internet of Things Means for the Public Sector, which explores insights and best practices into how government is using automated machine-to-machine transactions and implementing IoT in the public sector. The cyber world is a dangerous place. In a rapidly escalating environment of cyberthreats, obsolete devices, software beyondRead… Read more »
Just a few years ago, the only security metric that mattered was whether your organization had been hacked or not. This all-or-nothing definition of security success is now outdated. There are new, more complex metrics that measure the strength of your security posture.
The Internet of Things – it’s a phrase that sounds as ominous as it is ambiguous. Many of us have heard of the Internet of Things (IoT), but everyone seems to have a different understanding of exactly what it means. Is it hardware? Software? Sensors? Is it secure? Where is it being used? Self-driving cars,Read… Read more »
“It would be false to say that people are happily sharing their data with us.” That’s how the Department of Defense’s Col. Bob Saxon explained his agency’s efforts to open up government data. For all of its potential benefits, open data also presents security risks to those providing the information. From loss of agency confidentiality,Read… Read more »
On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in theRead… Read more »