Cybereye

CyberEye

  • cybersecurity

    Where do you draw the line on securing critical infrastructure?

    Recent multistage attacks against high-value targets confirm what we should already know: It is difficult if not impossible to set limits on what kind of infrastructure is critical enough to receive cybersecurity attention.

  • fingerprints

    Approximate matching can help find needles in haystacks

    NIST is preparing a publication explaining the technique called approximate matching that helps analysts spot malicious code in files using functions that look for similarities.

    Comments: 1
  • Internet

    Mobile, enterprise users drive US IPv6 growth

    The push by the federal government and mobile carriers for IPv6 adoption has put the United States at the top of the list of IPv6 leaders despite the slow rate of consumer network upgrades.

  • Congress

    After Target cyberattack, Congress votes to do precisely nothing

    In response to the “very real and serious nature of the cyberthreat today,” the latest version of the National Cybersecurity and Critical Infrastructure Protection Act would ensure that nothing changes.

  • STEM

    Drumbeat of data breaches sounds computer literacy alarms

    The U.S. educational system is failing to address the rising demand for computer-savvy students, and the result is evident in the increasingly bigger and more serious data breaches.

  • mobile security

    Secret to BYOD: Make security an enabler

    Blocking access to sensitive data by mobile workers in the end is counterproductive. Instead, it’s better to protect data by incorporating better access controls in the technology itself.

    Comments: 1
  • target

    Scoring cybersecurity hits and misses for 2013

    Predictions are easy; accurate predictions are harder. Here’s how we did last year in predicting cybersecurity trends for 2013.

  • cloud security

    Locking down cloud applications

    The Cloud Security Alliance and SAFECode have identified best practices for developing applications that meet the unique security requirements of cloud computing.

  • powerplant

    DHS drafts network protection plan, but Congress dithers

    The National Infrastructure Protection Plan being developed by DHS is intended to help define and facilitate a voluntary alliance between government and private infrastructure owners.

  • security

    Improving federal cybersecurity need not depend on Congress

    NIST continues to expand security guidance for government and private-sector IT systems that choose to use it, in spite of Congress' inability to pass cybersecurity legislation.

    Comments: 1