When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
Advances in quantum computing threaten the cryptographic systems now securing commercial and government communications. NIST is launching an effort to identify post-quantum algorithms that can resist this new paradigm.
Have You invested a lot in your applications and want the full return on your investment? Well, You do not necessarily need to replace your legacy apps, but you do need to manage them.
As the boundary between the real world and cyberspace becomes more blurred, NIST is offering guidance for engineering cybersecurity into increasingly complex physical systems.
The use of IT systems in automobiles is outpacing industry’s ability to secure them, and effective government regulation is likely to be a decade or more away.
The IRS is preparing for a digital future as if the Real World had already disappeared. It’s no surprise that the agency’s taxpayer service has gone to hell. IRS managers and their congressional overseers have to acknowledge that the Internet is not…
Lack of communication between IT departments and those responsible for executing agency mission can lead to the creation of shadow IT—unauthorized and often unmanaged applications that can introduce vulnerabilities. This is something that SecurityCenter Continuous View™ (CV) can help you identify, understand…
NIST has published recommendations for using crypto algorithms such as AES for format-preserving encryption (FPE), which can be a big help in protecting personal financial and health data.
A new Common Criteria protection profile for peripheral sharing switches boosts the security of desktop components where classified and unclassified networks converge.