While Congress seems to understand the urgency of implementing cybersecurity solutions, critical technology that was recognized as essential years ago still isn’t fully deployed.
Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.
Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.
Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?
It’s no use having good endpoint security if the behavior of the users negates that.
Could future breaches stem from such non-obvious sources as police body cameras or device components?
While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.
Musings on recent news on the government cybersecurity front.