An increasingly complex and networked world poses new threats; cloud computing, social networking and mobile platforms claim the attention of security prognosticators for 2010.
Former DHS cybersecurity chief Greg Garcia says political infighting slowed the development of the young department, but he is confident that things are getting better.
We are more vulnerable than ever, but such an attack would not be easy.
If we accept that cyber warfare is a reality — or at least a possibility — we need to develop a clear doctrine for using the offensive and defensive capabilities being developed.
Most reported cases of identity theft come from old-fashioned theft of wallets, purses and PCs, one study shows. But the sheer bulk of data available on servers and company computers makes those types of risks frightening.
The intentional disclosure of innocuous information to unintended audiences is an emerging risk that comes with the new generation of social networking and collaboration tools. When enough of this data is correlated, that can become a dangerous breach.
One security vendor suggests there's a limit to how much software developers can improve the security of the programs they create, and some of the larger vendors are reaching that limit.
A survey by out-of-band authentication provider PhoneFactor finds a growing percentage of IT security and authentication professionals are worried about the security of their data.
A Senate Judiciary Committee staffer says the odds look good for passing a comprehensive data protection act. Then we can move on to updating FISMA.
DHS is stressing "Our Shared Responsibility" during this year's National Cybersecurity Awareness Month, but client-side security tools too often make it more difficult than necessary to keep yourself safe online.
Former US-CERT director Mischel Kwon says that responding to real attacks and paying attention to the drudge work of patch and vulnerability management can go a long way toward improving government IT system security.
Although Twitter, texting and instant messaging make shortened URLs convenient, when you are clicking on a link, what you can’t see can hurt you.
Recent reports of persistent leaks of sensitive Defense Department information through file sharing highlights the risks of peer-to-peer applications that can open up unexpected files to others on the network.
The story of problems encountered by a would-be government IT worker generates a host of complaints about hiring practices in the federal workplace.
The current status of IPv6 networking in no way ensures security, but agencies can begin working with vendors now to ensure that better security is built in by the time the new protocols are in general use.