Cybereye

CyberEye

  • Securing the human endpoint

    Securing the human endpoint

    It’s no use having good endpoint security if the behavior of the users negates that.

    Comments: 1
  • laptop connection

    The Internet of malware-infected things

    Could future breaches stem from such non-obvious sources as police body cameras or device components?

    Comments: 2
  • Is mobile security finally getting some respect?

    Is mobile security finally getting some respect?

    While other aspects of IT security have been ratcheted up over the years, mobile security has proven a much tougher nut to crack and has lagged in the race for attention and funding.

  • Cyber notes: Progress on identity ecosystem, Android trust and another email vulnerability

    Cyber notes: Progress on ID ecosystem, Android trust and another email vulnerability

    Musings on recent news on the government cybersecurity front.

  • Backsliding on cybersecurity?

    Backsliding on cybersecurity?

    The recent Government Accountability Office’s report indicates that government seems to be backsliding on many of its commitments to IT security.

  • Can feds give cybersecurity the attention it deserves?

    Can feds give cybersecurity the attention it deserves?

    Cybersecurity is just one of many competing issues agency IT managers must juggle.

    Comments: 1
  • spear phishing

    Phish me once, shame on you. Phish me twice…

    Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?

    Comments: 2
  • Shadow BYOD

    Dumb and dumber: Shadow BYOD in government agencies

    Employees who use personal devices outside agency parameters expose agency networks to hosts of mobile malware.

  • Windows 10 touts enterprise- and mobile-friendly security

    Windows 10 touts enterprise- and mobile-friendly security

    The security features should help the desktop OS stay relevant and make the mobile ecosystem more like iOS or Android.

  • Windows XP: The undead OS

    Windows XP: The undead OS

    While agencies acknowledge the risks and expense of continuing to run Windows XP, killing off the entrenched operating system is taking longer than anticipated.

    Comments: 1

inside gcn

  • 18 states tap DHS for voting security help

    18 states ask DHS for help securing voting systems


More from 1105 Public Sector Media Group