Cybereye

CyberEye

  • Heartbleed redux with Secure Shell?

    Heartbleed redux with Secure Shell?

    Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.

  • Cybersecurity in 2016: Real change or more of the same?

    Cybersecurity in 2016: Real change or more of the same?

    Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.

  • Why network resiliency is so hard to get right

    Why network resiliency is so hard to get right

    Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?

  • Securing the human endpoint

    Securing the human endpoint

    It’s no use having good endpoint security if the behavior of the users negates that.

    Comments: 1
  • laptop connection

    The Internet of malware-infected things

    Could future breaches stem from such non-obvious sources as police body cameras or device components?

    Comments: 2
  • Is mobile security finally getting some respect?

    Is mobile security finally getting some respect?

    While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.

  • Cyber notes: Progress on identity ecosystem, Android trust and another email vulnerability

    Cyber notes: Progress on ID ecosystem, Android trust and another email vulnerability

    Musings on recent news on the government cybersecurity front.

  • Backsliding on cybersecurity?

    Backsliding on cybersecurity?

    The recent Government Accountability Office’s report indicates that government seems to be backsliding on many of its commitments to IT security.

  • Can feds give cybersecurity the attention it deserves?

    Can feds give cybersecurity the attention it deserves?

    Cybersecurity is just one of many competing issues agency IT managers must juggle.

    Comments: 1
  • spear phishing

    Phish me once, shame on you. Phish me twice…

    Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?

    Comments: 2

inside gcn

  • flood video

    Crowdsourced mapping for flood tracking, prediction