Cybereye


PRESENTED BY: Adobe

CyberEye

  • Massive OpenSSL audit hopes to squash Heartbleed-like bugs

    Massive OpenSSL audit hopes to squash Heartbleed-like bugs

    The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.

  • Equation’s firmware threat

    Now that’s persistent: Equation’s firmware threat

    An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.

  • Cyber info sharing: More noise than signal?

    Cyber info sharing: More noise than signal?

    Can government manage the growing ecosystem around cybersecurity information sharing while still improving how fast it reacts to threats?

    Comments: 3
  • Best cyber defense: tech savvy, informed users

    Best cyber defense: tech savvy, informed users

    Leaders at the World Economic Forum in Davos moved cybersecurity higher on their agenda, but threats will only worsen without users who understand the tools and tactics of a sound cybersecurity defense.

    Comments: 2
  • 2015 augurs newer, more devastating exploits on the unprepared

    2015 augurs newer, more devastating exploits on the unprepared

    Big data, mobile and hybrid cloud technologies are creating challenging security environments for which half of organizations in a recent study had no disaster recovery plan.

  • Police body cameras are only one piece of the video equation

    Police body cameras are only one piece of the video equation

    A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.

    Comments: 4
  • Cyberattack ‘platforms’ call for defense in depth – and breadth

    Cyberattack ‘platforms’ call for defense in depth – and breadth

    The new level of advanced persistent threats – some lasting for a decade or more – calls for agencies to extend their defensive measures to cover threats to partners well outside the enterprise.

  • Cyberecurity’s not done until the paperwork is finished

    Cybersecurity’s not done until the paperwork is finished

    The VA has been dinged – again – by the GAO because of incomplete follow-through in its cybersecurity operations, showing that it takes more than mere box-checking to make regulators happy.