Cybereye

CyberEye

  • mobile security (Boiko Y/Shutterstock.com)

    The road to derived mobile credentials

    Programs in both the civilian and military sectors are starting to deliver on earlier promises to give government workers credentials on their mobile devices.

  • Jumping on the blockchain bandwagon

    Jumping on the blockchain bandwagon

    This could be the year when blockchain hype dissipates and it becomes a major, if still early-stage, cybersecurity tool.

  • The cyber curse of ‘interesting times’ (Photo by Elena11/ShutterStock)

    The cyber curse of ‘interesting times’

    This year will be a critical one for cybersecurity, with both government and industry coming to grips with what’s needed to counteract the rapidly rising tide of attacks.

  • Are states ill-equipped to manage cybersecurity?

    Are states ill-equipped to manage cybersecurity?

    State governments have been under constant pressure to modernize their IT systems, improve service delivery and cut costs. Along the way, something is bound to break.

  • Get ready for IoT-enabled threats

    Get ready for IoT-enabled threats

    The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.

  • Moving cybersecurity from art to science

    Moving cybersecurity from art to science

    New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

  • Lessons from the OPM breach

    The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.

  • Derived credentials for mobile on the horizon?

    Derived credentials for mobile on the horizon?

    A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.

  • Can users help solve the mobile security disconnect?

    Can users help solve the mobile security disconnect?

    Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.

inside gcn

  • agile development (Kalakruthi/Shutterstock.com)

    CMS goes all-in on agile


More from 1105 Public Sector Media Group