Remove 07
Remove 2018 Remove Blog Remove Security Remove Tips
article thumbnail

Treating cybersecurity like workplace safety

CGI

Fri, 07/06/2018 - 00:40. Today, agencies need to bring the same level of motivation to ensure that their data and devices are secure. Federal IT leaders must consider security needs early on, whether an application is being developed or a process is being automated. Tips to prioritize cybersecurity.

article thumbnail

Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices

CGI

Thu, 07/05/2018 - 05:06. See our related blog, “ Not all blockchains are created equal when it comes to energy consumption.”) Recent headlines about cyber attacks to mine cryptocurrencies are just the tip of the iceberg. Unfortunately, the security of most Internet-connected devices is questionable at best.

Mining 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The blockchain bowling alley: How distributed ledger technology goes mainstream

CGI

Fri, 07/20/2018 - 02:40. In this blog, I break down distributed ledger technology (or “blockchain” for simplicity) into its defining properties, show how these properties are being applied in trade finance, and describe how they can solve problems in other industries. Blog moderation guidelines and term of use.

article thumbnail

The blockchain bowling alley: How distributed ledger technology goes mainstream

CGI

Sat, 07/28/2018 - 02:40. In this blog, I break down distributed ledger technology (or “blockchain” for simplicity) into its defining properties, show how these properties are being applied in trade finance, and describe how they can solve problems in other industries. Blog moderation guidelines and term of use.

article thumbnail

Fight the insider threat with CDM and identity governance

CGI

Tue, 05/15/2018 - 04:07. Security is everybody’s business. For many agencies, this initiative represents the first time that they are building a holistic view of their entire user population and provides a significant opportunity to identify and mitigate potential security risks. It’s a point that is worth reiterating.