From the Fall 2015 Issue

Moving Past Passwords: PIV Credentials for Mobile Device Users

Author(s):

William (Curt) Barker, Cybersecurity Standards and Technology Advisor, National Cybersecurity Center of Excellence

How many accounts do you have that require a username and password? And how many of those usernames and passwords are the same? Chances are that the answer is quite a few. The drive to create more secure passwords, requiring case-sensitive letters, numbers, symbols, and high minimum character counts, often drives people to reuse passwords … Read more

From the Fall 2015 Issue

HOW GOVERNMENTS CAN TURN BYOD FROM A CHALLENGE INTO AN OPPORTUNITY

Author(s):

Joseph Petroski, Senior Director of Sales Engineering, CellTrust Corporation

Bring your own device (BYOD) is not new to government organizations. For years, employees have used their own computers and laptops for work. What has changed is the dramatic rise in mobile device use for both personal and professional interactions. As a result, state and federal government agencies are looking at new ways to support … Read more

From the Fall 2015 Issue

What Is Lurking in the IT Shadows?

Author(s):

Joel Dolisy, CTO and CIO, SolarWinds

Despite its ever-growing presence in federal agencies, shadow IT remains as difficult to define as it is to detect. Shadow IT generally refers to the trend of users adopting IT tools and solutions that are outside of the knowledge or control of the official IT department. For example, most IT departments provide email to employees, … Read more