Between the costs of replacing core systems and the dwindling number of workers qualified to work on them, agencies have few good options.
Is overconfidence by IT security managers a bigger problem than technology challenges?
New studies show just how rapidly the threats are growing -- yet government is still wrestling with basic cyber hygiene.
As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”
The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.
Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.
The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.
An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.
Can government manage the growing ecosystem around cybersecurity information sharing while still improving how fast it reacts to threats?