Cybereye

CyberEye

  • lock with bullet hole (wk1003mike/Shutterstock.com)

    New breach, same lessons

    The Equifax breach has brought the security of open source software to the fore, yet again, and highlighted the ongoing struggle organizations still have with cybersecurity.

  • risk alternatives (Narong Jongsirikul/Shutterstock.com)

    NIST's how-to for prioritizing risk

    The latest guidance on risk assessment offers agencies a way to identify the most critical parts of an infrastructure so they can better choose what to upgrade.

  • cyber attack (By GlebStock/Shutterstock.com)

    WannaCry: A preview of coming attacks?

    With malware innovations seemingly outpacing the efforts of both public and private entities to protect against them, we must find a new way to deal with the issues malware poses.

  • mobile security (Boiko Y/Shutterstock.com)

    The road to derived mobile credentials

    Programs in both the civilian and military sectors are starting to deliver on earlier promises to give government workers credentials on their mobile devices.

  • Jumping on the blockchain bandwagon

    Jumping on the blockchain bandwagon

    This could be the year when blockchain hype dissipates and it becomes a major, if still early-stage, cybersecurity tool.

  • The cyber curse of ‘interesting times’ (Photo by Elena11/ShutterStock)

    The cyber curse of ‘interesting times’

    This year will be a critical one for cybersecurity, with both government and industry coming to grips with what’s needed to counteract the rapidly rising tide of attacks.

  • Are states ill-equipped to manage cybersecurity?

    Are states ill-equipped to manage cybersecurity?

    State governments have been under constant pressure to modernize their IT systems, improve service delivery and cut costs. Along the way, something is bound to break.

  • Get ready for IoT-enabled threats

    Get ready for IoT-enabled threats

    The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.

  • Moving cybersecurity from art to science

    Moving cybersecurity from art to science

    New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

inside gcn

  • complaint button on keyboard (ESB Professional/Shutterstock.com)

    EEOC preps for #MeToo complaints