Cybereye

CyberEye

  • NIST drafts mobile security guidelines for responder tech

    NIST drafts mobile security guidelines for responder tech

    The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.

  • Critical infrastructure in the crosshairs

    Critical infrastructure in the crosshairs

    Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.

  • No benign apps

    No such thing as a benign app?

    Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.

  • The bad news about bug hunting

    The bad news about bug hunting

    The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.

    Comments: 1
  • Software-defined perimeter security for cloud-based infrastructures

    Software-defined perimeter security for cloud-based infrastructures

    A recent demonstration tested the viability of using an SDP front end to provide the access between various compute resources located across multiple public clouds.

  • Is predictive analytics really a game changer?

    Is predictive analytics really a game changer?

    It may be too soon to tell, but predictive analytics offers agencies hope that they can get ahead of the threat rather than just cleaning up after the fact.

    Comments: 2
  • IBM quantum computer

    Prep for next-gen encryption should start yesterday

    Because the effort to pull together any kind of quantum-resistant cryptography will be lengthy and complex, the process must start now if those trusted cryptosystems are to be developed in time.

    Comments: 2
  • Confidence: The secret sauce for security

    Confidence: The secret sauce for security

    When neither employers nor workers have confidence in an organization’s ability to protect data, security tools can only provide part of the answer.

  • Government slow to mount defense against APTs

    Government slow to mount defense against APTs

    The FBI believes at least one group of hackers has been using APTs against government agencies for at least the past five years -- and possibly much longer.

    Comments: 2

More from 1105 Public Sector Media Group