Cybereye

CyberEye

  • Get ready for IoT-enabled threats

    Get ready for IoT-enabled threats

    The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.

  • Moving cybersecurity from art to science

    Moving cybersecurity from art to science

    New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

  • Lessons from the OPM breach

    The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.

  • Derived credentials for mobile on the horizon?

    Derived credentials for mobile on the horizon?

    A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.

  • Can users help solve the mobile security disconnect?

    Can users help solve the mobile security disconnect?

    Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.

inside gcn

  • White House experiments with augmented reality

    White House experiments with augmented reality