Cybereye

CyberEye

  • Secure code before or after sharing?

    Secure code before or after sharing?

    When agencies release code to open source, should they sanitize it before release or trust to the community to eventually secure it?

  • quantum encryption

    Can we build quantum-resistant encryption?

    New research demonstrating that quantum computing is now just an engineering challenge moves the possibility of encryption-cracking machines to the front burner.

    Comments: 3
  • Feds want mobile security, except when they don’t

    Feds want mobile security, except when they don’t

    Conflicting messages over mobile devices security sow doubt and confusion.

  • Is SDx the model for IT security?

    Is SDx the model for IT security?

    Software-defined systems could prove the best way to tackle the security problems that otherwise threaten to overwhelm government.

  • Still early days for federal cybersecurity?

    Still early days for federal cybersecurity?

    While Congress seems to understand the urgency of implementing cybersecurity solutions, critical technology that was recognized as essential years ago still isn’t fully deployed.

  • Heartbleed redux with Secure Shell?

    Heartbleed redux with Secure Shell?

    Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.

  • Cybersecurity in 2016: Real change or more of the same?

    Cybersecurity in 2016: Real change or more of the same?

    Despite 2015 providing an embarrassment of cybersecurity breach riches, there’s not much indication that government overall is paying that much more attention to security.

  • Why network resiliency is so hard to get right

    Why network resiliency is so hard to get right

    Both perimeter defense and effective elimination of threats that have breached the network are key components of a cybersecurity strategy. But what's the right mix?

  • Securing the human endpoint

    Securing the human endpoint

    It’s no use having good endpoint security if the behavior of the users negates that.

    Comments: 1
  • laptop connection

    The Internet of malware-infected things

    Could future breaches stem from such non-obvious sources as police body cameras or device components?

    Comments: 2

inside gcn

  • workflow (Urupong Phunkoed/Shutterstock.com)

    Agencies focus process, outcomes to improve efficiency