Security practitioners all agree: when you “assume the breach” will happen, you can provide better security. This assumption forces organizations to consider not only protection, but also detection and responses to breaches.
Data Centric Security
A digital signature employs cryptography to provide two main information security capabilities: Authentication and Integrity.
When people think of “digital signatures,” most picture the electronic signing of a contract or document online. It’s fast, convenient and eliminates the pain of 1) physically signing and hand-carrying a large stack of pages 2) losing a part of an important document and 3) needing all parties in one room to sign something.
Last week, members of the cybersecurity community joined Adobe and Nextgov at an event called “Mission Critical: An Update on Federal Cybersecurity.” In a packed room near the White House, Dr. Steven Gottwals, technical director for security solutions at Adobe Systems Federal, outlined Adobe’s vision for improved federal cybersecurity based around adoption of data-centric security solutions.
Click here to read this article.