We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find…
As recreational and medical use of marijuana becomes legal in more states, there is a growing demand for tools and technology to move the drug from bootleg to effective medication. A small Massachusetts company is helping meet that demand.
What if there was a different way to look at security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? Varmour does that. It’s called segmentation, and is…
A wrongheaded approach to cybersecurity and hostility toward federal workers make it likely that government cybersecurity—already a high-risk challenge—will get worse before it gets better.
Automation could be the answer to feds dealing with constant attacks, reducing the time from detection to remediation from months to seconds. The basic concept is simple enough, simply using the power of the network itself to counter threats, but the reality…
Federal cybersecurity has been in the GAO’s list of high-risk programs for 20 years, and there is no sign of its getting off any time soon. The biggest hurdle? It’s probably the workforce.
The recent women’s march on DC showed the limitations of smartphone technology. During a crisis or an emergency, or in this case a massive protest march, cellular service can become overloaded. Here is what we need to do about that.
NIST scientists are helping to redefine the standard units of measure that we use to make sense of our universe. The changes are expected to be adopted in November 2018 by the General Conference on Weights and Measures and would go into…
The growing complexity of IT enterprises and the cyberthreats facing them have eroded governments’ confidence in their ability to assess and mitigate cybersecurity risk, according to the latest Global Cybersecurity Assurance Report Card. The ability to see infrastructure and monitor activity is…
An anonymous social media app, Duby, is building an online community for tokers who want to share what they are thinking and doing. The technology behind it is innovative and could be valuable to advertisers.