Remove 05
Remove 2018 Remove Blog Remove Security Remove Tips
article thumbnail

Treating cybersecurity like workplace safety

CGI

Tue, 05/15/2018 - 04:16. Today, agencies need to bring the same level of motivation to ensure that their data and devices are secure. Federal IT leaders must consider security needs early on, whether an application is being developed or a process is being automated. Tips to prioritize cybersecurity.

article thumbnail

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Find out: How they really feel about security? Mobile Data Best Practices: Legal, Business, and Security Considerations. According to the Information Commissioner’s Office (ICO), the number of data subject access requests has more than doubled since 2016, with 9,090 recorded from May 25 to December 11, 2018.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

Thu, 07/05/2018 - 05:06. See our related blog, “ Not all blockchains are created equal when it comes to energy consumption.”) Recent headlines about cyber attacks to mine cryptocurrencies are just the tip of the iceberg. Unfortunately, the security of most Internet-connected devices is questionable at best.

Mining 74
article thumbnail

The blockchain bowling alley – how distributed ledger technology goes mainstream

CGI

Tue, 05/15/2018 - 06:17. In this blog, I break down distributed ledger technology (or “blockchain” for simplicity) into its defining properties, show how these properties are being applied in trade finance, and describe how they can solve problems in other industries. Many technologies have come and gone over the past decades.

article thumbnail

Fight the insider threat with CDM and identity governance

CGI

Tue, 05/15/2018 - 04:07. Security is everybody’s business. For many agencies, this initiative represents the first time that they are building a holistic view of their entire user population and provides a significant opportunity to identify and mitigate potential security risks. It’s a point that is worth reiterating.