NIST has produced a guide to producing software with fewer vulnerabilities. This is a necessary step to improving cybersecurity, but it will be a long time before our software infrastructure is reliable.
By: Makoto Mizuyama
Member of the board of directors, FinalCode
The cyberthreat landscape is complex and constantly evolving, and we saw a constant stream of breaches in 2016 ranging from the embarrassing (exposure of email addresses on a fetish website) to the ominous (IoT-based…
TWB CEO John Breeden made three bold predictions in NextGov magazine about what 2016 would hold for government and technology. We go back and check his work, seeing how many of those predictions came true.
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards.
The National Industrial Security Policy Operating Manual…
NIST has revised its guidance to help small businesses establish cybersecurity programs. It is based on the Cybersecurity Framework, which has proved to be a versatile valuable document since its publication in 2014.
The SafeBreach continuous security validation platform simulates how specific networks are vulnerable to attack, and how to plug what is likely quite a few holes in existing defenses. Read the Network World testing and review.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means…
Skylanders: Imaginators is one of the most technically advanced videogames ever created, allowing for the creation of fully programmable toys that warp into the game through the power portal. Suitable for kids or adults, our review tested large groups of both, it…