The National Institute of Standards and Technology recently issued a practice guide showing two ways federal employees using mobile devices could be authenticated to access secure information systems and applications.
Defending against phishing attacks involves a combination of policies, procedures and controls.
Despite privacy concerns, many officials envision people using digital licenses not only for traffic stops and airport ID but also in bars, banks, doctor’s offices and as voter ID at polling places.
Even with government and industry working on quantum-resistant encryption, getting any solutions rolled out will take time and a massive effort.
Besides protecting systems from automated attacks, agencies must also guard against data being physically removed from the building.
A holistic approach that tears down the traditional silos of backup and recovery, security and infrastructure management will ensure the security of data in the cloud.
Government should step in to ensure facial recognition technology is developed without biases, experts say.
The Business Software Alliance is crafting a framework to help policymakers develop rules and legislation around software security.
Although most of the focus of bring-your-own-device policies has been on security, agencies must also ensure their networks continue to operate efficiently in the midst of the growing mobile use.
The Morris worm set the stage for the crucial, and potentially devastating, vulnerabilities in what has been called the coming internet of everything.