Security

Latest Posts in

IoT and Privacy: The Connected Toilet Strikes Again

There’s a new loo. If you’re a gadget-head, you’ve probably seen more than a few of the bizarre inventions debuted at CES over the years, including the new smart toilets.…

3 Reasons You Should Start With Access Rights Management Over Access Management

Inevitably, at some point in the evolution of your security strategy, you realize you need to put some controls around access. For far too long, organizations have allowed users to…

Breach Data Trends: October 2019 to March 2020

Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…

Solving the Contractor Breach Challenge

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed…

Securing a Tide of the Internet of Things

IoT has the potential to offer state and local municipalities real and tangible benefits for their citizens. The IoT is already powering smart city efforts throughout the country, through things…

The Top Five Security Fails in Every Data Breach

If your company hasn’t had a data breach, it’s only a matter of time until it happens. Unless you begin to make a big investment in security, have regular audits…

Assemble a Team of IT Experts Focused on Cybersecurity

In today’s world of constant cyberthreats from terrorism, hackers, and viruses, public and private sector organizations need to assemble a strong, experienced team of security experts. But finding a talented…

Medical Device Hacking Worldwide: Part 2

Did you read my last post with the positive story of how people are community-hacking their medical devices to improve their quality of life? While writing my last post, I…

Three Steps to Improve Identity and Access Management Without Undermining Productivity

Today’s government IT professionals set rules to provide users with access rights, improving workflows while protecting agencies against threats. Unfortunately, the prevalence of mobile devices and cloud-based applications has made…

Unpopular Opinion: How SD-WAN Will Improve Security

The consensus is software-defined networking in a wide area network (SD-WAN) will provide organizations unprecedented agility but possibly at the expense of security, as traffic flow changes to a distributed…