Ensuring the security of new devices brought into the enterprise is a challenge, but if administrators don’t find a way to say “yes” to this technology, they are likely to find themselves in a losing battle with workers, says the Veterans Affairs Department’s CIO, Roger Baker.
After a brief respite, spam appears to be making a comeback. Like the poor, it will always be with us.
The robot is designed to open combination locks by brute force by testing possible combinations.
World IPv6 Day will provide a chance to see where the leaks and points of failures are in the Internet's IPv6 infrastructure.
DHS studied what worked and what didn't in fighting the Conficker worm, and government collaboration did not fare well.
In the wake of Stuxnet it is clear that our critical infrastructure "is in play," says Black Hat founder Jeff Moss, and resilience is a strategic deterrent to attack.
An examination of some phishing logs by a Web security company raises the question of why mobile users are more likely to take the bait.
Location-aware applications on smart phones can come in handy, at times even saving lives. But you also could be sharing more information than you think.
The human user is the first line of defense in cybersecurity but also a persistent weakness.
Last year’s predictions for what to expect in 2010 were not too far off the mark.
After six months of analysis, the celebrity worm’s makers, target and impact are still unknown, but that has not stopped the speculation.
WikiLeaks didn't reveal much in the way of truly sensitive State Department information, but the kerfuffle over leaked documents did shed a revealing light on the government's policies for classifying documents.
The attacks and counterattacks surrounding WikiLeaks might be the first real instance of cyber warfare, with the government launching its own unconventional type of strategic denial-of-service attacks.
The shortage of skilled cybersecurity professionals is the result of complex problems that will take a while to correct. The good news, for those who qualify, is that it is likely to remain a growth field for some time.
Stuxnet demonstrates the difficulties and dangers of offensive cyber warfare.