Cybereye

CyberEye

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

  • Lessons from the OPM breach

    The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.

  • Derived credentials for mobile on the horizon?

    Derived credentials for mobile on the horizon?

    A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.

  • Can users help solve the mobile security disconnect?

    Can users help solve the mobile security disconnect?

    Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.

  • NIST drafts mobile security guidelines for responder tech

    NIST drafts mobile security guidelines for responder tech

    The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.

    Comments: 1
  • Critical infrastructure in the crosshairs

    Critical infrastructure in the crosshairs

    Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.

  • No benign apps

    No such thing as a benign app?

    Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.

  • The bad news about bug hunting

    The bad news about bug hunting

    The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.

    Comments: 1
  • Software-defined perimeter security for cloud-based infrastructures

    Software-defined perimeter security for cloud-based infrastructures

    A recent demonstration tested the viability of using an SDP front end to provide the access between various compute resources located across multiple public clouds.

inside gcn

  • A cornerstone of government transparency gets an overhaul

    A cornerstone of government transparency gets an overhaul