Interoperability of IT security products is necessary to secure networks, but a panel of government administrators concluded that it is people, not products, that often are the greatest barrier to sharing data.
The best Web hacks of 2008 tended to focus on the client side, according to one security professional at the RSA conference.
Conficker/Downadup didn’t turn ugly April 1, but that doesn’t mean it should be ignored.
A civilian group patterned after DISA could help provide a single interface to procurement, hosting and systems engineering services while helping with enterprise standardization and improved pricing.
The multifaceted malware appears to be updating itself again in its never-ending mission to detect and infect unpatched systems.
Scientists at NIST prove that what once looked like a promising technique for limiting errors in futuristic computers is not only more difficult than thought, but impossible. But that is a good thing to know.
A new variant of Neeris began infecting Microsoft Windows-based systems between March 31 and April 1 while IT security experts were focused on the Conficker worm.
A survey of compliance with industry cybersecurity standards indicates that many power generation and transmission companies might be ignoring their critical cyber assets.
As development of an intelligent grid for energy distribution becomes a high priority, industry wants standards for a new critical infrastructure.
A lack of business incentives has slowed deployment of IPv6, but Google’s experience with the new protocols show that “if you build it, they will come.”
The Homeland Security Department wants to upgrade the situational awareness tool used at the department’s National Operations Center and make it more accessible to state and local authorities.
Federal CIOs and CISOs should consider adopting a new set of network security recommendations, named the Consensus Audit Guidelines.