Cybereye

CyberEye

  • The cyber curse of ‘interesting times’ (Photo by Elena11/ShutterStock)

    The cyber curse of ‘interesting times’

    This year will be a critical one for cybersecurity, with both government and industry coming to grips with what’s needed to counteract the rapidly rising tide of attacks.

  • Are states ill-equipped to manage cybersecurity?

    Are states ill-equipped to manage cybersecurity?

    State governments have been under constant pressure to modernize their IT systems, improve service delivery and cut costs. Along the way, something is bound to break.

  • Get ready for IoT-enabled threats

    Get ready for IoT-enabled threats

    The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.

  • Moving cybersecurity from art to science

    Moving cybersecurity from art to science

    New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

  • Lessons from the OPM breach

    The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.

  • Derived credentials for mobile on the horizon?

    Derived credentials for mobile on the horizon?

    A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.

  • Can users help solve the mobile security disconnect?

    Can users help solve the mobile security disconnect?

    Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.

  • NIST drafts mobile security guidelines for responder tech

    NIST drafts mobile security guidelines for responder tech

    The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.

    Comments: 1
  • Critical infrastructure in the crosshairs

    Critical infrastructure in the crosshairs

    Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.

inside gcn

  • Getting roads ready for connected, autonomous vehicles (ShutterStock image)

    Getting roads ready for connected, autonomous vehicles