Cybereye

CyberEye

  • Confidence: The secret sauce for security

    Confidence: The secret sauce for security

    When neither employers nor workers have confidence in an organization’s ability to protect data, security tools can only provide part of the answer.

  • Government slow to mount defense against APTs

    Government slow to mount defense against APTs

    The FBI believes at least one group of hackers has been using APTs against government agencies for at least the past five years -- and possibly much longer.

    Comments: 2
  • Secure code before or after sharing?

    Secure code before or after sharing?

    When agencies release code to open source, should they sanitize it before release or trust to the community to eventually secure it?

  • quantum encryption

    Can we build quantum-resistant encryption?

    New research demonstrating that quantum computing is now just an engineering challenge moves the possibility of encryption-cracking machines to the front burner.

    Comments: 3
  • Feds want mobile security, except when they don’t

    Feds want mobile security, except when they don’t

    Conflicting messages over mobile devices security sow doubt and confusion.

  • Is SDx the model for IT security?

    Is SDx the model for IT security?

    Software-defined systems could prove the best way to tackle the security problems that otherwise threaten to overwhelm government.

  • Still early days for federal cybersecurity?

    Still early days for federal cybersecurity?

    While Congress seems to understand the urgency of implementing cybersecurity solutions, critical technology that was recognized as essential years ago still isn’t fully deployed.

  • Heartbleed redux with Secure Shell?

    Heartbleed redux with Secure Shell?

    Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.

  • Cybersecurity in 2016: Real change or more of the same?

    Cybersecurity in 2016: Real change or more of the same?

    Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.

  • Why network resiliency is so hard to get right

    Why network resiliency is so hard to get right

    Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?


More from 1105 Public Sector Media Group