keystroke

Keystroke encryption coming for Apple, Android phones

GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.

phishing

Internet Explorer leads in tests against social engineering threats

Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.

audio

5 ways to protect audio and microphones from malicious exploits

Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.

hacker

Military, NASA other agencies hit in series of attacks

A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.

HP ZBook 15

HP laptop has workstation power, gov-level security

The ZBook 15 is a powerful workstation in every way except size and shape.

binary

How quantum key distribution works

QKD uses a photon's polarization and spin to verify an unobserved key transmission.

power lines

Threats to privacy become a focus of Smart Grid planning

NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

photon

Can quantum cryptography work in the real world?

Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

Seattle

One city fends off cyberespionage attacks, and collaboration is key

Seattle's collaboration with the FBI and a DHS fusion center helped thwart attacks from China, but that kind of information sharing doesn't happen enough, a new report says.

skull

Reminder: The Web is not the only source of malware

A cloud-based Web filtering and policy enforcement service helped the city of Aspen sharply reduce browser infections, but it doesn't replace antivirus protection.

power plant

8 areas for improvement in securing critical infrastructure

The Cybersecurity Framework will be a living document, and the current version identifies gaps and weaknesses that will be addressed in future iterations.

Aspen

How Aspen's DNS services became more secure, reliable and cheaper

Outsourcing Domain Name Services and Web policy enforcement to OpenDNS saves the Colorado city and county money while improving security.

Topic Resources

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.

  • All About Self-Encrypting Drives

    With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.

  • Continuous Monitoring to Achieve Cybersecurity

    As the cyber threat landscape evolves, security methods and tools need to change, too. In this Digital Dialogue, Ken Durbin, manager of Continuous Monitoring Practice at Symantec, explains how the undefined boundaries of the modern IT infrastructure necessitate the deployment of continuous monitoring solutions.