Cybereye

CyberEye

  • What a secure mobile OS means for BYOD

    Lollipop or lockdown? What a secure mobile OS means for BYOD

    Android Lollipop and iOS8 present government mobility managers with more options for balancing end-user convenience with the requirements of high-threat, classified environments.

    Comments: 1
  • Taking aim at stealthy attacks

    Taking aim at stealthy attacks

    The recent SandWorm report on cyber espionage against NATO highlights the need for strategies such as the cyber kill chain to detect and disable stealthy, zero-day threats before they bleed you dry.

  • What gives? Shellshock fails to shock

    Shortly after the Heartbleed bug caused a panic in security circles, along comes something which could be even more serious and the reaction seems to be one big yawn.

    Comments: 1
  • Hoping higher FISMA scores mean more than compliance

    Hoping higher FISMA scores mean more than compliance

    Growing resources and increasing attention being paid to continuous monitoring could help agencies consolidate last year's gains in FISMA performance.

  • Why so slow to move off SHA-1?

    Why so slow to move off SHA-1?

    While the private sector is winding down its use of the decades-old algorithm in their products, government is still grinding out SHA-1 certificates.

  • biometrics

    Passwords vs. biometrics

    It’s not a competition, but neither provides completely secure or effective access control on its own. What is needed is an appropriate combination of technologies.

    Comments: 3
  • SSL remains security weakness despite latest reinforcements

    SSL remains security weakness despite latest reinforcements

    Secure Socket Layer-based encryption remains vulnerable to attack despite promising efforts to tighten management of the humble but critical security protocol.

  • Do you know where your mobile data is?

    Do you know where your mobile data is?

    Recent hacks of celebrity data that had been saved to the cloud illustrate the need to be aware of what your mobile devices – agency-issued or BYOD – are doing and where the data is going.

  • Cubes floating in space

    The growing security threat to virtual systems

    Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.

  • Personal Identity Verification card

    Happy birthday HSPD-12; there’s still a long way to go

    The presidential directive mandating interoperable smart government ID cards is 10 years old this month, and represents an impressive effort to specify and implement the technology. Now we need to put it to use.

    Comments: 2