Sometimes it feels like security professionals and business leaders are speaking different languages. That’s why it’s critical for managed security providers to communicate with their clients’ financial decision-makers in a business-aligned manner that conveys how cybersecurity can.
Meta s CEO and Founder- Mark Zuckerberg has revealed a new campaign in which they have been mocking Apple and criticising them for providing end-to-end encryption only, for iMessage and not for regular SMS communication. Whereas, WhatsApp has been providing total protection to its user.
By GCN Staff
Apr 12, 2021
Kentucky is planning to equip all the commonwealth’s 120 county clerks with Yubikey devices to enable two-factor authentication that will better protect the state’s voter registration system from unauthorized access.
Users insert a Yubikey token into the USB ports on their laptops and touch its button to verify they are a local human user and not a remote hacker.
The Yubikeys will be made available thanks to a federal grant obtained via a joint partnership of the Kentucky Secretary of State, the mayor of Lexington, Ky., the Kentucky Office of Homeland Security and the U.S. Department of Homeland Security.
Researchers at the University of California, Berkeley ranked nine technologies according to technical vulnerability, attractiveness to nation-state attackers and potential impact of a successful attack.
By Beau Hutto
Mar 16, 2021
Nimble thinking affords organizations the ability to act and respond quickly amid evolving circumstances, and it’s key to both cloud adoption and capitalizing on cloud capabilities. Unfortunately, nimble thinking can be tough for federal agencies to integrate into operations that are subject to regulations and scrutiny.
Federal agencies have made progress on cloud adoption, but as top researchers over the past few years have pointed out, many are still struggling. It’s hard to blame them; despite overtures around acquisition reform and contracting agility, too often decision-makers remain saddled with decades-old processes that treat security hardware as the same kind of resource as a fighter jet. Cloud security like IT writ large requires a different mindset. It’s all about investing in the future of security and embracing the promise of nimble thinking that will pay dividends.