Cybereye

CyberEye

  • Next-gen cybersecurity means anticipating threats

    Next-gen cybersecurity means anticipating threats

    Maintaining effective cyberthreat defenses not only requires constant vigilance but also an eye on the road ahead.

  • Role for humans in cybersecurity automation

    Security automation: Are humans still relevant?

    The increasing complexity and sophistication of cyberthreats is driving the use of automation in cybersecurity. Where does human intelligence fit in the picture?

    Comments: 1
  • Will NIST break its close relationship with the NSA in developing cryptographic and cybersecurity standards?

    NIST's future without the NSA

    Can the standard agency develop effective cryptographic and cybersecurity standards without the help of the National Security Agency?

  • Windows Server 2003: The end is nearer than you think

    Windows Server 2003: The end is nearer than you think

    It can take seven months or more to migrate to a new server operating system, so Microsoft's July 2015 cut-off date for Windows Server 2003 support really is just around the corner.

  • Stakes rising as malware matures

    Stakes rising as malware matures

    How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?

  • Man stares at screen

    Can telework improve cybersecurity?

    Although the federal government is trying to encourage telework, a new survey shows agencies are losing workers because of a lack of telework opportunities at a time when a shortage of cybersecurity professionals is being called a threat to national security.

    Comments: 3
  • Wrenches and bolts to tighten security for the Internet of Things

    Tools to tighten the Internet of Things

    Built with cost and performance in mind, interconnected systems contain vulnerabilities that are increasingly attractive to attackers looking for protected information or who want to disrupt public services. Some tools are emerging to help.

    Comments: 2
  • encryption

    Last call for comments on Keccak encryption

    The public will weigh in on NIST's choice of new a secure hash algorithm developed in response to advances in techniques for breaking of federal document encryption standards.

  • Man with bug spray against stinkbugs

    Is antivirus now useless?

    Debates over the state of antivirus technology and tools has resurfaced yet again after the executive in charge of Symantec's information security business was quoted as saying antivirus is dead.

    Comments: 1
  • Man juggling spinning remote IT devices

    Is shadow IT spinning out of control in government?

    It's not a new problem, but it is getting worse, and government needs to be more agile in responding to the influx of consumer IT into the enterprise.