Cyber weapons: 4 defining characteristics

Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.

cybersecurity cloud

Compromised IDs, reused passwords and shadow IT make a dangerous mix

With the average public sector employee using more than 16 cloud services, a new study finds, the impact of one compromised account can be immense.

States flex cyber leadership muscle

States flex cyber leadership muscle

New Jersey is the latest state to establish an information-sharing unit, while several other states are trying different tactics.

NIST drafts framework for privacy risk

The framework will help agencies calculate the privacy risk for their IT systems.

4 ways federal IT pros can help their networks – and themselves – thrive

4 ways federal IT pros can help their networks – and themselves – thrive

Six nines of uptime is certainly achievable with a little bit of simplification and planning -- and a whole lot of technology and teamwork.

Security tools top the list of AWS add-ons

Security tools top the list of AWS add-ons

According to a recent survey by 2nd Watch, security tools were the most popular third-party purchase for Amazon cloud deployments.

To thwart password theft, the devil is in the decoys

To thwart password theft, the devil is in the decoys

Newly developed password manager software aims to deter hackers by surrounding the real passwords with convincing fakes.

A cloud lockbox to keep data secure

A cloud lockbox to keep data secure

New Microsoft cloud efforts aim to further secure and protect customer data, while increasing transparency about the security.

Is swipe technology the future of authentication?

Is swipe technology the future of authentication?

The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.

VA security holding in face of mounting threats

VA security holding in face of mounting threats

Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.

What keeps federal CISOs awake at night

What keeps federal CISOs awake at night

Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.

The insider threat in employees’ pockets

The insider threat in employees’ pockets

Five experts offer advice on managing risks when agency employees bring their own mobile devices to work