CyberEye

William Jackson

Bill Jackson (bjackson@1105govinfo.com), a senior writer for GCN, covers security issues.


Spam takes a holiday?

The percentage of spam measured in Symantec's most recent monthly report shows a decline over the last year, but there is still plenty to go around. And watch out during the holidays.

Security reform? What security reform?

Government and industry still are waiting for a clear policy on cybersecurity, but it is not likely to emerge soon.

Public takes a stand on presidential Internet 'kill switch'

The latest Security Index study by Unisys asked people if they approved of turning over control of the Internet to the president during an international emergency.

Are you as safe online as you think you are?

A preponderance of people say they are responsible for their own security when going online, but too few of them are practicing what they preach, according to a recent survey.

ID management's weakness: Few want to use it

The National Strategy for Trusted Identities in Cyberspace might be a good start toward establishing an effective way to manage online identities, but the test will be industry’s ability to produce secure, user-friendly technology and convince the public to use it.

Why so slow to move on CyberScope?

A survey of federal CIOs and CISOs finds skepticism of CyberScope, a new FISMA reporting tool. But that appears to be based on ignorance.

Don't panic: IPv4 address depletion is not a crisis

Hype is beginning to appear about the impending crisis of IPv4 address depletion and the need to adopt IPv6. Yes, we do need to prepare, but the Internet will still be with us.

Government takes the lead on IPv6 adoption

OMB's recent mandate for enabling IPv6 on public-facing government Web servers and internal agency networks is a welcome and much-needed step toward future-proofing the Internet.

Why the need for IPv6? Blame Vint Cerf.

The godfather of the Internet says it's his fault that we're running out of IP addresses.

Can a public health approach cure the Internet?

A plan for international cybersecurity has attractive features, but there are serious real-world challenges that would stand in the way.

The cure is known, but the cyber disease persists

Even though the number of new vulnerabilities seems to be flattening, the persistence of known vulnerabilities in IT systems means that increasingly sophisticated attackers still have a target-rich environment. Patch and configuration management can help.

Time for U.S. to assert itself on the Internet, report says

A new report from the Council on Foreign Relations says the Internet has become essential to the nation’s security and economic well-being, and the United States needs to protect those interests in defining how the Internet is governed.

Both sides should win in public safety network battle

First responders could benefit from the innovation of commercial carriers in establishing a nationwide public safety network. Can we ensure they do not have to fight for access?

Spammers waste no time infecting Apple's Ping

Less than a week after launching its new social network for music, Apple had to scrub the spammers out of Ping.

Agencies slowly gain ground on continuous monitoring

A survey of IT professionals shows that many respondents have begun monitoring their systems on a nearly continuous basis, but work remains to be done in the search for vulnerabilities and risks.