Cybereye

CyberEye

  • Two knights facing each other on chess board

    China's cyber spying: Time for a Cold War response?

    CSIS fellow Jim Lewis says we need to bring a full range of diplomatic and intelligence resources to bear against Chinese incursions into U.S. systems, not just beef up cybersecurity.

    Comments: 4
  • Auditor works on checklist while man puts out fire in background

    FCC vs. GAO: Haste = waste, or he who hesitates is lost?

    FCC was upbraided by auditors for cutting corners in upgrading network security. Did the commission create unnecessary risk or just do what was necessary?

    Comments: 2
  • Person signing tax forms

    Does the IRS really know who you are?

    Identity theft could be costing the government billions of dollars a year in fraudulent tax refunds, and it is hard to say whether the shift to electronic tax filing is a boon or a bane.

    Comments: 2
  • Earbuds

    The P2P risks behind House's Spotify ban

    The House of Representatives has ruffled feathers by banning a peer-to-peer music network, but P2P raises security concerns that merit caution.

  • Water leaking out of disconnected hoses

    Sometimes, the Internet just breaks

    It's easy to forget that the Internet relies on physical infrastructure that can break. Not every disruption is an attack.

  • Cybersecurity

    When reforming FISMA, don't throw out what works

    After more than a decade, the Federal Information Security Management Act could use some updating, but Congress should take the time to look at what really has worked.

  • Man in a downpour

    Denial-of-service attacks: It's a problem, bro

    Distributed denial-of-service attacks are becoming more common, more powerful and the botnets that support them more resilient.

  • Dirty coffee cups in sink

    Disable Java? For agencies, the real question is: Why not?

    Once again admins are being advised to disable Java in the wake of a new vulnerability. It's time to decide how important this plug-in is to your enterprise and when -- if ever -- it should be used.

    Comments: 2
  • Chain with string as center link

    An emerging target for cyber attacks: Trust

    A new study of the evolving cyber threat landscape identifies a half-dozen areas likely to be high-profile targets in the immediate future, including something called "trust infrastructure."

  • PIV card and reader

    Agencies need to put the "I" into security

    Today's systems, policies and procedures were developed to lock information down, not to share it securely. Interoperable credentials could be the key.