HackDig : Dig high-quality web security articles for hackers

A Look at the Computer Security Act of 1987

U.S. Federal Cybersecurity TodayComputer security regulations have come a long way from their early beginnings.  Even before the Federal Information Security Management Act (FISMA), there was the Computer Security Act of 1987 (CSA). The Computer Security Act was enacted by the 100th United States Congress in response to a lack of computer security prote
Publish At:2020-12-02 02:44 | Read:433 | Comments:0 | Tags:Featured Articles Government computer security Federal feder

ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived

According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus on CSPs and how a good CSP can provide services that provide monetary savings for your agency.Cloud Service Providers (CSP) and FedRAMPFedRAMP’s defines Cloud Service Provi
Publish At:2020-08-26 23:30 | Read:879 | Comments:0 | Tags:Cloud Featured Articles CSP ExpertOps Federal

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:4666 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

The OPM Breach and Why You Should Fire Your Cyber Janitor

In June of 2015 the United States Office of Personnel Management (OPM) announced they had been the target of what became one of the largest breaches of government data in history. When the dust settled, it was determined that over 20 million people were affected. The data stolen from individuals was Social Security numbers, names, addresses, relatives, and
Publish At:2017-03-11 18:40 | Read:4243 | Comments:0 | Tags:Threats Endpoint Protection Federal Malware Zero Day

5 non-negotiable principles to combat cyber war on mobile

Cyber war is a term the U.S. government is intimately familiar with, but woefully unprepared for when it comes to mobile. Government employee mobile devices are a relatively new attack surface, and a particularly valuable one for espionage missions and other criminal intent. Mobile devices access confidential, classified, and other protected data classes. A
Publish At:2017-02-17 03:30 | Read:4565 | Comments:0 | Tags:Enterprise Mobile Security Uncategorized cyber war Federal g

Security week-in-review: U.S.A. versus cyber threats

It’s hard to keep up with the hundreds of security-specific headlines published every week. So, we’re rounding up the top news that affect you, your business, and the security and technology industry overall. This week we explore President Obama’s new proposal to increase cybersecurity spending, a breach on the FBI, and the FCC commissioner’s comments on ha
Publish At:2016-02-13 05:15 | Read:4125 | Comments:0 | Tags:Security Federal mobile security security week in review

Employee Spotlight: Alex Gladd on working both engineering and sales at the same time

In this series we’re highlighting some of our awesome employees and the work they do. In their own words, you’ll hear about our employees biggest wins, favorite moments, and reasons for doing what they do. Interested in starting a career at Lookout? Check out our open jobs. Alex Gladd Forward Deployed Engineer, Sales Why do you do your job? Living in D.C.,
Publish At:2015-12-19 11:05 | Read:4049 | Comments:0 | Tags:Lookout News Careers engineering Federal sales Security

Shadow BYOD: The mobility program you thought you didn’t have

While the federal government might be under the impression that it doesn’t have a BYOD program, it is overlooking a key issue: Shadow BYOD. Shadow BYOD is very similar to Shadow IT, in which employees use technologies — usually to enhance their productivity — that the IT department has not sanctioned or deployed. In Shadow BYOD’s case, it’s the
Publish At:2015-08-19 16:30 | Read:3561 | Comments:0 | Tags:#Data BYOD Federal mobile security


Tag Cloud