New studies show just how rapidly the threats are growing -- yet government is still wrestling with basic cyber hygiene.
As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”
The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.
Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.
The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.
An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.
Can government manage the growing ecosystem around cybersecurity information sharing while still improving how fast it reacts to threats?
Leaders at the World Economic Forum in Davos moved cybersecurity higher on their agenda, but threats will only worsen without users who understand the tools and tactics of a sound cybersecurity defense.
Big data, mobile and hybrid cloud technologies are creating challenging security environments for which half of organizations in a recent study had no disaster recovery plan.