According to security companies, summer is a dead time for hacking and phishing. But the bad guys, like much of the corporate world, look to the fourth quarter to make up their profits for the year.
Although officials lament the shortage of qualified IT security professionals to fill critical roles in government ranks, one frustrated applicant complains that cumbersome hiring policies discourage those who want the jobs.
Cyberattacks against government and news media during last year’s invasion of Georgia allowed the Russian military to win without blowing up critical infrastructure. Is this good news or bad news?
The new NIST recommendations for IT security controls raise the question of whether it still makes sense to implement security controls based on the sensitivity of an individual system when those systems' perimeters are becoming more ill-defined.
The recent resignations of White House cybersecurity adviser Melissa Hathaway and US-CERT director Mischel Kwon should not be construed as indicators that cybersecurity has fallen off the Obama administration's radar screen.
It doesn’t really reach the level of terrorism, but some countries seem to be including online attacks in their portfolio of diplomatic activities.
The battle to secure cyberspace might not be a battle we can ever really win; it is likely to remain a constant fight in which the best we can hope for is to not let the bad guys get too far ahead.
There is no perfect way to make passwords both convenient and safe, but there are some tricks and techniques that can help.
Recent hacks of Twitter data and the misuse of the microblogging service for phishing and other malicious activities highlight the danger of adopting new technologies before they are business-ready.
The new Cyber Command, which will be a part of the Strategic Command, represents an organizational change rather than an operational change in the military’s defense of cyberspace.
Longer passphrases can be easier to remember and provide more security than shorter but more complex passwords with multiple character sets.
Commentary: The most important thing Congress can do in reshaping the Real ID Act is to engage in a full debate on the value of establishing a national ID.
If we are going to cooperate and share information to improve cybersecurity, we need to have a common language for it.
The impact of the new cybersecurity coordinator will depend on how well the office is supported by the president.
A temporary restraining order taking a rogue Internet service provider offline could mean we might see a little less spam in our inboxes, for now.