How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?
Although the federal government is trying to encourage telework, a new survey shows agencies are losing workers because of a lack of telework opportunities at a time when a shortage of cybersecurity professionals is being called a threat to national security.
Built with cost and performance in mind, interconnected systems contain vulnerabilities that are increasingly attractive to attackers looking for protected information or who want to disrupt public services. Some tools are emerging to help.
The public will weigh in on NIST's choice of new a secure hash algorithm developed in response to advances in techniques for breaking of federal document encryption standards.
Debates over the state of antivirus technology and tools has resurfaced yet again after the executive in charge of Symantec's information security business was quoted as saying antivirus is dead.
It's not a new problem, but it is getting worse, and government needs to be more agile in responding to the influx of consumer IT into the enterprise.
A new survey shows that with little money to spend on tools aimed at insider threats, most organizations have to limp along by jerry-rigging existing, and unsuitable, cybersecurity tools to do the job.
The government says it did not know about the OpenSSL vulnerability before it was publicly disclosed. But if it had known, it might not have told us, says White House Cybersecurity Coordinator Michael Daniel.
New guidelines on improving encryption tools in the wake of the Heartbleed bug offer a range of options for improving encryption, but bigger changes loom down the road.
Having a single credential that can be authenticated by a trusted authority and accepted by multiple users can reduce the attack surface by maintaining personally identifiable information at a single point.