Machine analytics help San Diego protect its systems

Machine analytics help San Diego protect its systems

The city teamed up with Splunk to monitor and analyze its machine-generated data.

chain of command

DOD lacks clear chain of command for domestic cyber attacks

The Pentagon has not defined how it will support civilian authorities in the event of cyber attacks, according to a Government Accountability Office report.

New mobile biometric tools on tap for ICE agents

New mobile biometric tools on tap for ICE agents

NEC's newest biometric fingerprinting device promises faster and more accurate data collection in the field.

Standardizing secure by default

Standardizing secure by default

Building data secure by default is now technically possible, but a standard must be developed before we’re faced with a stream of fragmented, unsecured data.

Registration opens for DOD bug bounty program

Registration opens for DOD bug-bounty program

White-hat hackers have a chance to try their skills against the Defense Department with the opening of the "Hack the Pentagon" pilot, designed to identify and resolve security vulnerabilities in DOD websites.

Using the NSA Intrusion Lifecycle to bolster security

Using the NSA Intrusion Lifecycle to bolster security

Although enterprise security will never be perfect, the NSA lifecycle can give defenders a model for mapping the appropriate mitigation to each step in the intrusion process.

SideStepper exploit targets iOS MDM security

SideStepper exploit targets iOS MDM security

The vulnerability lets attackers use hijacked devices enrolled in mobile device management programs to launch man-in-the-middle attacks, according to Check Point Software.

DHS stands up public-private cyber info sharing platform

DHS stands up public-private cyber info sharing platform

Automated Indicator Sharing allows industry and government to exchange cybersecurity threat information.

Competition pits college students against hackers

Competition pits college students against hackers

Cybersecurity students from eight universities will compete to defend a mock financial institution from attack.

How blockchain works

How blockchain works

A blockchain-based system marries ironclad trust to a fully auditable sequence of digital events enclosed in a highly secure environment.

Put your trust in knowing untrusted certificate authorities

Put your trust in knowing untrusted certificate authorities

Google has started to maintain a list of untrusted certificate authorities, which it’s calling Submariner.

University of Colorado, Colorado Springs

Colorado looks to flatten cyber learning curve for elected officials

The state’s National Cybersecurity Intelligence Center aims to be the country’s foremost authority on cybersecurity education, research and rapid response.

Topic Resources


More from 1105 Public Sector Media Group