There are two trends that information security leaders should watch closely: The growing sophistication of fraudsters, and the concurrent "consumerization" of the workplace.
True anonymity on the Internet is critical to allow citizens to exercise their First Amendment rights or access medical and tax information from the government without disclosing their identities, says DHS's Bruce McConnell.
A look back at a House hearing on cyber attribution, a senior Homeland Security infosec adviser on authentication and the thoughts of the departing Navy CIO.
Economics and a lack of standards and interoperability have stood as barriers to widespread adoption of two- and multifactor authentication, DHS's Bruce McConnell said.
Cybersecurity Coordinator Howard Schmidt unveils a White House blueprint to create an online environment where people and business can complete transactions in confidence.
What are the key banking/security topics on the minds of leaders of the nation's largest banks?
At the RSA Conference 2010, Paul Smocer of BITS and the Financial Services Roundtable discusses:
The Roundtable's information security priorities;
How regulatory reform may impact security organizations;
The...
Passwords are the bane of my existence -- probably yours, too. In order to be a good, secure, computer and Internet user, ideally I should have a different password for every single application I use, website I register to, and place I visit on the Internet. I frequently have at least 10 to 15 different passwords and...
Government agencies at all levels (federal, state and local) face unprecedented IT security threats from an increasingly organized and well-funded community of cybercriminals. Add stringent regulatory requirements to this and government agencies are faced with a daunting task of managing risk and adhering to...
As the federal government begins to pilot the use of third-party credentials to authenticate users at three websites, the advocacy group Center for Democracy and Technology this month has published a white paper, Issues for Responsible User-Centric Identity, raising questions it feels must be addressed before...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.