A lot of attention has been given lately to the security in the Internet of Things. Unfortunately, there is already a widely installed base of vulnerable hardware and software that is being exploited for attacks. Are we doomed to another losing game…
On October 15, 2016, the naval commissioning ceremony for the USS Zumwalt will take place in the Port of Baltimore. The USS Zumwalt is not only the newest ship in the U.S. Navy, it represents a new class of warship that takes…
People looking for a historical thriller in the new Oliver Stone movie Snowden may be disappointed. Chris Inglis, who was the Deputy Director of the NSA during the incident, calls the film grossly inaccurate in an exclusive interview with TWB author John…
Microsoft has a long tradition of spicing up relatively dull product announcements with compelling tech demos, and the Windows 10 announcement was no exception. The software giant used the opportunity to create a fair amount of buzz about the HoloLens, a futuristic…
Standards are being published for creating new private sector Information Sharing and Analysis Organizations. Will these ISAOs be the tools we need to improve the nation’s cybersecurity?
Few technologies are more vital to the bottom line of a modern business than document automation. Document automation’s universal application, speed of accessibility and ease of use can make or break a company of any size. It can mean the difference in…
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions.
The…
Despite years of rising concern over cybersecurity risk, the old conflict between operations and security remains the number one challenge for federal agency CISOs. Agencies must do a better job of building risk management into operational decisions.
You may have a missing component in your defenses if you are not protecting your proprietary data. Either by malicious effort or accidental incompetence, users can send customer, financial, secret or sensitive information out of your network via almost unlimited channels. Network World…
The new U.S.-E.U. Privacy Shield, new European data privacy rules, Brexit, and globalization are combining to create interesting times for U.S. companies doing business across borders.
