Remove Authentication Remove Information Security Remove Internet
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

As an information security trailblazer, Mr. Bigman participated in developing security measures for Government computers well before commercial industry found the Internet. He then developed creative solutions to allow the CIA to use the Internet to further its mission without exposure. Dr. Richard Marshall, Esq.,

Software 257
article thumbnail

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking. Edge computing best practices.

Security 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

Pervasive computing relies on the convergence of wireless technologies, advanced electronics and the Internet. The products are connected to the Internet and the data they generate is easily available. Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

article thumbnail

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking. Edge computing best practices.

Security 113
article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

“What’s the next killer app in the Internet of Things?”. to iWatch: The Internet of Things” suggested several groundbreaking ideas that might be in the running. Carl Levine, community manager at Dyn , noted that despite two-factor authentication across servers for their clients, this topic is still one of the most discussed issues.

Security 119
article thumbnail

What You Need To Know About The Administration’s Cybersecurity National Action Plan

CTOvision

The plan calls for a campaign to encourage people to use multi-factor authentication in everything. The plans calls for the creation of a federal chief information security officer. This is a good thing to do. It is one of the most important steps we can take to make it harder on the bad guys.

article thumbnail

Sweet Treats, Sour Breach: Cyberattack Hits Krispy Kreme

SecureWorld News

Trey Ford, Chief Information Security Officer at Bugcrowd, observed, "This incident may not have been made public if it wasn't for the Form 8-K requirement." The attack goes to show that, truly, nothing Internet-connected is sacred." Identity security is paramount in today's threat landscape.