Data-Centric Security: Myths and Reality… Guidance for Federal Adoption

Over the last few years, the OPM breach and other attacks on federal government and commercial information systems have captured the attention of officials and lawmakers. These cyberattacks have created a shift in thinking throughout the public sector, and the expectation now is that all agencies have already been breached; the attackers are already in The post Data-Centric Security: Myths and Reality… Guidance for Federal Adoption appeared first on Voltage.
Read more

The Key to Encryption: Simple for Government Leaders; Difficult for Attackers

Over the last few decades, the U.S. government created more than 100,000 custom digital applications. These apps continue to serve different purposes and live at different levels within the government — spanning teams, departments, organizations and even entire agencies. At a federal level, the government manages terabytes of both anonymized and personally identifiable information (PII). The post The Key to Encryption: Simple for Government Leaders; Difficult for Attackers appeared first on HPE Security - Data Security.
Read more