NIST is asking industry to help develop a solution to help ensure the integrity of data after a breach or other incident. The effort is being undertaken at NIST’s National Cybersecurity Center of Excellence.
Now two years old, the Cybersecurity Framework will get a few tweaks from NIST, but the community is generally happy with guidelines for securing the nation’s critical infrastructure. Information sharing remains a problem area, however.
An entire industry has sprung up to provide a defense against insider threats. TWB CEO John Breeden reviewed products from Fortscale, Avanan, and PFU Systems for Network World, and found each one concentrating on a different aspect of the problem. Dim the…
Shannon Felder, senior account executive with LEWIS Global Communications, recently interviewed Tech Writers Bureau's Rutrell Yasin for her blog, covering issues such as technology and the government sector, cybersecurity, and how public relations professionals can be more effective working with folks in…
Agencies are spending more than ever on maintaining legacy IT. But there was more smoke than fire at this week’s House committee hearing on legacy tech.
As the U.S. power grid becomes increasingly vulnerable to electromagnetic disruptions—both natural and manmade—the clock is ticking toward possibly catastrophic solar storms that some scientists say are inevitable.
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.
John Breeden II goes for a virtual reality climb for his weekly NextGov Emerging Technology column. And while The Climb and other games for the Oculus Rift are enough to get the blood pumping, what is really surprising is how some scientists…
When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
Advances in quantum computing threaten the cryptographic systems now securing commercial and government communications. NIST is launching an effort to identify post-quantum algorithms that can resist this new paradigm.