TWB CEO John Breeden made three bold predictions in NextGov magazine about what 2016 would hold for government and technology. We go back and check his work, seeing how many of those predictions came true.
Online consumers say they want more security on their accounts, but they have to be prodded to adopt two-factor authentication.
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards.
The National Industrial Security Policy Operating Manual…
NIST has revised its guidance to help small businesses establish cybersecurity programs. It is based on the Cybersecurity Framework, which has proved to be a versatile valuable document since its publication in 2014.
The SafeBreach continuous security validation platform simulates how specific networks are vulnerable to attack, and how to plug what is likely quite a few holes in existing defenses. Read the Network World testing and review.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means…
Skylanders: Imaginators is one of the most technically advanced videogames ever created, allowing for the creation of fully programmable toys that warp into the game through the power portal. Suitable for kids or adults, our review tested large groups of both, it…
Change 2 to the National Industrial Security Program Operating Manual will require companies working with classified government information to create a full insider threat program. Despite that burden, it should be embraced in these troubling times.
It’s a sad fact that relationships between police and the communities they serve are, in some parts of the country, at an all-time low. The Miami-Dade County Police Department is attempting to change that by using some interesting new technology to reach…
A lot of attention has been given lately to the security in the Internet of Things. Unfortunately, there is already a widely installed base of vulnerable hardware and software that is being exploited for attacks. Are we doomed to another losing game…
