Cybereye

CyberEye

  • Get ready for IoT-enabled threats

    Get ready for IoT-enabled threats

    The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.

  • Moving cybersecurity from art to science

    Moving cybersecurity from art to science

    New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.

  • cybersecurity quality assurance

    NIST offers cyber self-assessment tool, updates email security guidance

    The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.

  • Lessons from the OPM breach

    The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.

  • Derived credentials for mobile on the horizon?

    Derived credentials for mobile on the horizon?

    A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.

  • Can users help solve the mobile security disconnect?

    Can users help solve the mobile security disconnect?

    Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.

  • NIST drafts mobile security guidelines for responder tech

    NIST drafts mobile security guidelines for responder tech

    The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.

    Comments: 1
  • Critical infrastructure in the crosshairs

    Critical infrastructure in the crosshairs

    Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.

  • No benign apps

    No such thing as a benign app?

    Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.

  • The bad news about bug hunting

    The bad news about bug hunting

    The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.

    Comments: 1

inside gcn

  • flood video

    Crowdsourced mapping for flood tracking, prediction