Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.
Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.
Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?
It’s no use having good endpoint security if the behavior of the users negates that.
Could future breaches stem from such non-obvious sources as police body cameras or device components?
While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.
Musings on recent news on the government cybersecurity front.
The recent Government Accountability Office’s report indicates that government seems to be backsliding on many of its commitments to IT security.
Cybersecurity is just one of many competing issues agency IT managers must juggle.
Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?