Cybereye

CyberEye

  • What’s worse: Living with legacy systems or replacing them?

    What’s worse: Living with legacy systems or replacing them?

    Between the costs of replacing core systems and the dwindling number of workers qualified to work on them, agencies have few good options.

    Comments: 4
  • IT security’s blind spot

    IT security’s blind spot

    Is overconfidence by IT security managers a bigger problem than technology challenges?

  • More bad news: The bad guys are getting better

    More bad news: The bad guys are getting better

    New studies show just how rapidly the threats are growing -- yet government is still wrestling with basic cyber hygiene.

    Comments: 1
  • Identity as a Service

    The new perimeter and the rise of IDaaS

    As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.

  • Verizon breach report

    Verizon breach report: bad news and worse news

    The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”

    Comments: 2
  • DARPA’s strategy for 100-year software

    The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.

    Comments: 1
  • Progress toward an identity ecosystem

    Progress toward an identity ecosystem

    Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.

  • Massive OpenSSL audit hopes to squash Heartbleed-like bugs

    Massive OpenSSL audit hopes to squash Heartbleed-like bugs

    The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.