By: Makoto Mizuyama Member of the board of directors, FinalCode The cyberthreat landscape is complex and constantly evolving, and we saw a constant stream of breaches in 2016 ranging from the embarrassing (exposure of email addresses on a fetish website) to the ominous (IoT-based distributed denial of service attacks) to the manipulative (Russian hacking during … Continue reading Cybersecurity trends for 2017: It’s all about the data
Publications
Fact-checking my 2016 predictions
Predicting things is easy. Predicting them accurately is more difficult. Here’s how I did on my predictions for this year.
Fact Check: NextGov’s 2016 Tech Predictions
TWB CEO John Breeden made three bold predictions in NextGov magazine about what 2016 would hold for government and technology. We go back and check his work, seeing how many of those predictions came true.
Overcoming user resistance to stronger authentication
Online consumers say they want more security on their accounts, but they have to be prodded to adopt two-factor authentication.
Time Crunch: Federal Contractors Scramble to Clear NISPOM Change 2
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards. The National Industrial Security Policy Operating Manual (NISPOM) is a perfect example of tightening cybersecurity requirements for federal contractors, … Continue reading Time Crunch: Federal Contractors Scramble to Clear NISPOM Change 2
New cybersecurity guidance for small businesses
NIST has revised its guidance to help small businesses establish cybersecurity programs. It is based on the Cybersecurity Framework, which has proved to be a versatile valuable document since its publication in 2014.
Network World Review: Can you beat a cyberattack with Safebreach simulator?
The SafeBreach continuous security validation platform simulates how specific networks are vulnerable to attack, and how to plug what is likely quite a few holes in existing defenses. Read the Network World testing and review.
Countering the counter-UAS Shortcomings
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt. Such threats, combined with others … Continue reading Countering the counter-UAS Shortcomings
GiN Review: Program Your Own Heroes with Skylanders: Imaginators
Skylanders: Imaginators is one of the most technically advanced videogames ever created, allowing for the creation of fully programmable toys that warp into the game through the power portal. Suitable for kids or adults, our review tested large groups of both, it also happens to be a whole lot of fun.
NextGov Tech Column: Change 2 for NISPOM Approved
Change 2 to the National Industrial Security Program Operating Manual will require companies working with classified government information to create a full insider threat program. Despite that burden, it should be embraced in these troubling times.