Cybereye

CyberEye

  • Cybersecurity in 2016: Real change or more of the same?

    Cybersecurity in 2016: Real change or more of the same?

    Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.

  • Why network resiliency is so hard to get right

    Why network resiliency is so hard to get right

    Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?

  • Securing the human endpoint

    Securing the human endpoint

    It’s no use having good endpoint security if the behavior of the users negates that.

    Comments: 1
  • laptop connection

    The Internet of malware-infected things

    Could future breaches stem from such non-obvious sources as police body cameras or device components?

    Comments: 2
  • Is mobile security finally getting some respect?

    Is mobile security finally getting some respect?

    While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.

  • Cyber notes: Progress on identity ecosystem, Android trust and another email vulnerability

    Cyber notes: Progress on ID ecosystem, Android trust and another email vulnerability

    Musings on recent news on the government cybersecurity front.

  • Backsliding on cybersecurity?

    Backsliding on cybersecurity?

    The recent Government Accountability Office’s report indicates that government seems to be backsliding on many of its commitments to IT security.

  • Can feds give cybersecurity the attention it deserves?

    Can feds give cybersecurity the attention it deserves?

    Cybersecurity is just one of many competing issues agency IT managers must juggle.

    Comments: 1
  • spear phishing

    Phish me once, shame on you. Phish me twice…

    Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?

    Comments: 2
  • Shadow BYOD

    Dumb and dumber: Shadow BYOD in government agencies

    Employees who use personal devices outside agency parameters expose agency networks to hosts of mobile malware.


More from 1105 Public Sector Media Group