The recent exploit of open redirect in some shortened .gov Web addresses underscores the importance of server configuration to guard against easily prevented problems.
Despite the critical role played by IT in both the economy and national security, the need to protect online assets gets little attention from candidates.
A recent survey on password use suggests that the more established and stable you are, the more likely you are to use a strong password.
A DHS alert on vulnerabilities found in control systems for solar power equipment underscores the importance of security in a complex and varied power grid.
DOT shut down its headquarters last spring and discovered that telework works, but problems can crop up in a few areas.
NIST is about to name the winner of a four-year competition for SHA-3. But one of the finalists questions whether we need it.
Online criminals get a taste of their own medicine.
With Microsoft’s successful use of federal law and courts to shut down botnets, most recently Nitol, the legal system is emerging as an effective tool for cybersecurity.
With the option of retaliating against cyber criminals, make sure the rule of law trumps the immediate gratification of doing unto others.