Cybereye

CyberEye

  • heartbleed and encryption key

    Heartbleed begets headaches in perfecting encryption

    New guidelines on improving encryption tools in the wake of the Heartbleed bug offer a range of options for improving encryption, but bigger changes loom down the road.

  • Device login screens plugged into the cloud

    Federating identity will slow personal information leaks

    Having a single credential that can be authenticated by a trusted authority and accepted by multiple users can reduce the attack surface by maintaining personally identifiable information at a single point.

    Comments: 2
  • Man looking at light bulbs

    Takeaways from Verizon's data breach report

    Despite all of the fervor and money that's being directed at government cybersecurity, a more immediately effective remedy might be to tighten up on information handling processes and procedures and general data hygiene.

  • Man blamed for using open source

    In the wake of Heartbleed, open source software is under scrutiny

    Open source software is not inherently more risky than proprietary, but you should be involved if you use it. “If it’s open source and it’s not secure, it’s partly your fault.”

    Comments: 1
  • Firefighter working on containment

    Is limiting damage the best hope for cybersecurity?

    With forecasts of more frequent, sophisticated and targeted attacks, government's best bet might be to limit the damage rather than trying to prevent the threats completely.

  • Decorated veteran in a parade

    Making IT security a priority at VA

    In the wake of 16 years of information security problems at the Veterans Affairs Department, Congress is considering legislation to focus management attention on the sprawling department's struggling security program.

  • Man turning over key for money

    Can government's cyber defense withstand a market-driven offense?

    Attacking U.S. networks has become a profit-driven big business that will put government confidence in its cyber forces to the test.

  • Man unhappy with lemon on plate

    When software development produces a lemon, make lemonade

    Twelve years after launching its Trustworthy Computing initiative, Microsoft has reduced the vulnerabilities in its operating systems and helped to change the way software is developed.

    Comments: 1
  • child and adult iris scans

    Blurred future for iris recognition?

    If the iris changes as people age, then ID systems based on iris recognition could cause security chaos.

    Comments: 4
  • Alarm clock in front of Windows XP desktop screen

    Is XP running your critical systems?

    More current Windows versions finally are replacing Microsoft's XP operating system, but a surprising number of critical systems are still running the 12-year-old OS and will need to be protected after Microsoft ends its support in April.

    Comments: 1