Commentators are warning of the dangers of the wildly popular game when used on mobile devices for business. But instead of worrying about Pokémon Go, you should have an enforceable policy in place for all apps.
William Jackson
Audio-hacking your smart phone
Researchers have demonstrated a way to hide voice commands to smart phones so that humans cannot understand them. Who’s talking to your phone?
Tenable Blog: Remembrance and Eternal Vigilance
In cybersecurity as in national security, remembrance and eternal vigilance are essential to maintaining our freedom.
We’re still waiting for the full impact
The market for cyber insurance is growing, but this industry has not yet reached the critical mass needed to reform how we protect our information infrastructures.
Tenable Blog: Vulnerability Management in Government–Visibility Plus Context
Vulnerability management is an essential part of government cybersecurity. It requires not only continuous monitoring and visibility to spot vulnerabilities, but also the context needed to prioritize vulnerabilities based on risk so agencies can take effective action to eliminate, patch or mitigate.
A step toward ensuring data integrity
NIST is asking industry to help develop a solution to help ensure the integrity of data after a breach or other incident. The effort is being undertaken at NIST’s National Cybersecurity Center of Excellence.
Gets its First Tune-up
Now two years old, the Cybersecurity Framework will get a few tweaks from NIST, but the community is generally happy with guidelines for securing the nation’s critical infrastructure. Information sharing remains a problem area, however.
Government’s IT legacy
Agencies are spending more than ever on maintaining legacy IT. But there was more smoke than fire at this week’s House committee hearing on legacy tech.
It is time to prepare for solar storms
As the U.S. power grid becomes increasingly vulnerable to electromagnetic disruptions—both natural and manmade—the clock is ticking toward possibly catastrophic solar storms that some scientists say are inevitable.
Tenable Network Security Blog
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.