Microsoft says start practicing now for Windows 10 update cycle

Microsoft says start practicing now for Windows 10 update cycle

IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.

black cloud software defined perimeter

‘Black Cloud’ darkens the enterprise to all but authorized devices

An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.

IoT: Is tech the easy part?

Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.

The hidden costs of “low-cost” surveillance cameras

The hidden costs of “low-cost” surveillance cameras

An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.

Beyond compliance: DISA STIGs’ role in cybersecurity

Beyond compliance: DISA STIGs’ role in cybersecurity

Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.

Hiring cybersecurity staff is hard for states

Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.

FBI seeks cyber threat info-sharing platform

FBI seeks cyber threat info-sharing platform

The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.

Army Training Network now accessible without a CAC card

Army Training Network goes mobile -- no CAC required

Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

What 700 TB of cyber threat data can do for you

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers

More evidence that employee negligence is security risk No. 1

Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.

Shutterstock image (by Rawpixel): Data file folder background.

Cyber tools that maximize ROI (maybe)

Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.

Bodyprint uses ear scans for authentication

Unlock your phone with your ear

Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.