• Man turning over key for money

    Can government's cyber defense withstand a market-driven offense?

    Attacking U.S. networks has become a profit-driven big business that will put government confidence in its cyber forces to the test.

  • Man unhappy with lemon on plate

    When software development produces a lemon, make lemonade

    Twelve years after launching its Trustworthy Computing initiative, Microsoft has reduced the vulnerabilities in its operating systems and helped to change the way software is developed.

    Comments: 1
  • child and adult iris scans

    Blurred future for iris recognition?

    If the iris changes as people age, then ID systems based on iris recognition could cause security chaos.

    Comments: 4
  • Alarm clock in front of Windows XP desktop screen

    Is XP running your critical systems?

    More current Windows versions finally are replacing Microsoft's XP operating system, but a surprising number of critical systems are still running the 12-year-old OS and will need to be protected after Microsoft ends its support in April.

    Comments: 1
  • protest

    NSA-bashing bills could hamstring cybersecurity info sharing

    Bills introduced recently at the state level could bar many technology companies from doing business not only with the NSA, but also with state and local government entities.

    Comments: 1
  • Google Glass

    The next security perimeter? You're wearing it.

    While agencies still struggle with BYOD security, wearable devices are poised to enter the government workplace, bringing a new set of concerns.

    Comments: 1
  • cybersecurity

    Where do you draw the line on securing critical infrastructure?

    Recent multistage attacks against high-value targets confirm what we should already know: It is difficult if not impossible to set limits on what kind of infrastructure is critical enough to receive cybersecurity attention.

  • fingerprints

    Approximate matching can help find needles in haystacks

    NIST is preparing a publication explaining the technique called approximate matching that helps analysts spot malicious code in files using functions that look for similarities.

    Comments: 1
  • Internet

    Mobile, enterprise users drive US IPv6 growth

    The push by the federal government and mobile carriers for IPv6 adoption has put the United States at the top of the list of IPv6 leaders despite the slow rate of consumer network upgrades.

  • Congress

    After Target cyberattack, Congress votes to do precisely nothing

    In response to the “very real and serious nature of the cyberthreat today,” the latest version of the National Cybersecurity and Critical Infrastructure Protection Act would ensure that nothing changes.

inside gcn

  • smart city

    Survey: Attacks on smart city IT all but inevitable

More from 1105 Public Sector Media Group