As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”
The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.
Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.
The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.
An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.
Can government manage the growing ecosystem around cybersecurity information sharing while still improving how fast it reacts to threats?
Leaders at the World Economic Forum in Davos moved cybersecurity higher on their agenda, but threats will only worsen without users who understand the tools and tactics of a sound cybersecurity defense.
Big data, mobile and hybrid cloud technologies are creating challenging security environments for which half of organizations in a recent study had no disaster recovery plan.
A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.