Quantcast
Channel: Government – Identity Week
Browsing latest articles
Browse All 17 View Live

Fast Track to CAG 12 Compliance

If you’ve ever been subject to typical IT security compliance regulations you’ve no doubt experienced the frustration of putting into action what can at times seem like complex, almost unintelligible...

View Article



The Evolution of Smartcard and Certificate Support

One topic that arises more and more frequently in conversations that I have – whether it’s with analysts and media, IT security professionals I meet in the course of my work, or my company’s government...

View Article

Defending Against Nation-State Cyber Attacks

If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen...

View Article

Government Information Security in the Age of Sequester

While meeting with a couple of my regular contacts at a recent AFCEA event, their conversation veered sharply from their normal assessments of cyber attacks into today’s prevalent motif of Beltway...

View Article

Data Breach at US Office of Personnel Management Reveals Intent of...

On the surface, last week’s data breach at the US Office of Personnel Management (OPM) might seem like just another cyber attack, like those which affected Target, Home Depot and many others. However,...

View Article


Guarding Against Spear Phishing Threats

IT security staff at these agencies are on guard against the now pervasive tactic of spear-phishing. In this targeted social engineering attack, hackers use emails that masquerade as trusted...

View Article

About This Week’s WikiLeaks CIA Hacking Disclosure…

This week’s sensational Wikileaks revelations about CIA hacking tools has raised all sorts of questions about the US intelligence agency’s hacking arsenal. Here’s my take on the matter. The post About...

View Article

What if WikiLeaks Releases Source Code for the CIA Hacking Tools?

WikiLeaks withheld the source code for the CIA hacking tools. One might wonder though, what could happen if WikiLeaks did publish this code? The post What if WikiLeaks Releases Source Code for the CIA...

View Article


Video: Cyber Defense for the Federal Government

Watch this FedScoop video interview of IT security expert Philip Lieberman to find out how federal government agencies can redesign their networks for better resilience against cyber attacks. The post...

View Article


Lessons Learned from the OPM Data Breach – Two Years Later

Two years removed from the announcement of the attack, we can now take a look at the lessons we learned from the OPM data breach. The post Lessons Learned from the OPM Data Breach – Two Years Later...

View Article
Browsing latest articles
Browse All 17 View Live




Latest Images