Cybereye

CyberEye

  • Two people use two separate keys to open bank deposit box

    Can the two-man rule foil insider threats?

    The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.

    Comments: 4
  • Man walking in a tunnel making a cell phone call

    Agencies showing sudden interest in encrypted comm

    Growth of BYOD encryption company Silent Circle, already robust, has skyrocketed in the wake of revelations of NSA surveillance, and government is the biggest customer.

  • Lightning strike from a cloud

    Can the cloud provide the best strategy for security?

    New, layered attacks call for intelligence-based security, and cloud computing offers a way to gather and analyze big data to spot malicious activity.

    Comments: 1
  • IT manager filling out forms for computer compliance

    Security best practices at the root of FISMA amendments

    Reform would focus on a risk-based approach using automated tools for continuous monitoring that agencies already are adopting. But will they be graded on security or paperwork?

    Comments: 1
  • Example of a password strength meter

    Those meters that rate password strength work, until they don't

    A study of meters used to measure strength of passwords created on websites suggests you can only push users so far before they stop trying.

    Comments: 7
  • Cyber retaliation illustration road sign

    The hack-back vs. the rule of law: Who wins?

    When considering retaliation against cyber criminals, make sure the rule of law trumps the immediate gratification of doing unto others.

  • Different cybersecurity word clouds on two facing monitors

    Built-in security could start with a common lexicon

    As part of efforts to secure government infrastructure, an interagency working group is developing plans for cybersecurity requirements in federal acquisitions, which would benefit from a consistent terminology.

  • Fingerprint scan

    Biometrics: Better than passwords but not bulletproof

    Government and industry experts think biometric authentication is poised to take off, but fingerprints, iris scans and voice recognition are not foolproof forms of ID.

    Comments: 1
  • White House official twitter feed

    Should agencies really have 'official' Twitter feeds?

    Social media outlets were never intended as mission-critical applications; recent events show why.

  • Many state and local government networks are unprepared for cyberattacks

    Many state and local networks unprepared for cyberattacks

    IT officials at a recent conference said efforts to protect their infrastructure are hampered by a lack of resources and a lack of understanding from those who make funding decisions.