The newest cyber risk: Hackers can hear what you

The newest cyber risk: Hackers can hear what you're printing

Using only a smartphone, researchers were able to get enough information from signals created by a 3-D printer’s nozzle to reverse-engineer the object being manufactured.

security blindness

Security blindness: Too many alerts and too few resources

With today’s “assumption of compromise,” organizations need a unified, analytics-driven platform for end-to-end visibility across the enterprise.

SecureLogix aims to stop TDoS attacks

SecureLogix aims to stop TDoS attacks

Simple and inexpensive telephony denial-of-service attacks are increasingly targeting government phone systems.

DOD lays out cyber implementation plan

DOD lays out cyber implementation plan

DOD Cybersecurity Discipline Implementation Plan covers identity authentication, reducing networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.

Beyond the ‘land of no’: 5 ways to balance user satisfaction and endpoint security

Beyond the ‘land of no’: 5 ways to balance user satisfaction and endpoint security

With proactive, appropriate security controls, IT managers can secure their networks, save administrative time and deliver a flexible, personalized environment for users.

HHS tightens FISMA compliance, but risks remain

HHS tightens FISMA compliance, but risks remain

While the Department of Health and Human Services has made progress in compliance with the Federal Information Security Modernization Act, it still has room to improve its security program.

Thwarting the threat actors: What government can do

Thwarting the threat actors: What government can do

While it is virtually impossible to know when cybercriminals will attack, taking certain preventative actions before an attack can certainly reduce the risk of damage.

drone technology

How hackable are first responders' quadcopters?

A researcher presenting at the RSA Security Conference said he can hack and hijack a popular drone model via two separate system vulnerabilities.

DOD launches bug bounty program

Pentagon launching bug bounty program

With the Hack the Pentagon program, the Defense Department is inviting vetted hackers to expose potential vulnerabilities.

Unisys Stealth coming to classified programs

Unisys Stealth coming to classified programs

The Unisys Stealth security software solution is close to approval for NSA’s Commercial Solutions for Classified Program Components List -- clearing the way for use on classified networks.

Modernization projects, human error top IT security concerns

Modernization projects, human error top IT security concerns

A survey of federal IT managers shows the biggest cybersecurity challenges agencies face.

The tech that locks down ID cards

The tech that locks down ID cards

Whether the card allows for access into a government building or another country, new technologies are making it easier for officials to verify identities.


More from 1105 Public Sector Media Group