Now two years old, the Cybersecurity Framework will get a few tweaks from NIST, but the community is generally happy with guidelines for securing the nation’s critical infrastructure. Information sharing remains a problem area, however.
Publications
Network World Review: Hot new tools to fight insider threats
An entire industry has sprung up to provide a defense against insider threats. TWB CEO John Breeden reviewed products from Fortscale, Avanan, and PFU Systems for Network World, and found each one concentrating on a different aspect of the problem. Dim the lights, pop the corn, and get ready to delve into the dark and spooky world of the insider threat.
GETTING TO KNOW YOUR OTHER AUDIENCE: PART 2
Shannon Felder, senior account executive with LEWIS Global Communications, recently interviewed Tech Writers Bureau’s Rutrell Yasin for her blog, covering issues such as technology and the government sector, cybersecurity, and how public relations professionals can be more effective working with folks in the media. Here’s an excerpt: You’ve been covering technology for more than 30 … Continue reading GETTING TO KNOW YOUR OTHER AUDIENCE: PART 2
Government’s IT legacy
Agencies are spending more than ever on maintaining legacy IT. But there was more smoke than fire at this week’s House committee hearing on legacy tech.
It is time to prepare for solar storms
As the U.S. power grid becomes increasingly vulnerable to electromagnetic disruptions—both natural and manmade—the clock is ticking toward possibly catastrophic solar storms that some scientists say are inevitable.
Tenable Network Security Blog
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.
NextGov: Emerging Tech – Virtual Reality is Science Fiction No More
John Breeden II goes for a virtual reality climb for his weekly NextGov Emerging Technology column. And while The Climb and other games for the Oculus Rift are enough to get the blood pumping, what is really surprising is how some scientists are using VR to do some amazing things, like treating diseases.
Bringing resiliency to software acquisition
When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
Future-proofing cryptography
Advances in quantum computing threaten the cryptographic systems now securing commercial and government communications. NIST is launching an effort to identify post-quantum algorithms that can resist this new paradigm.
IBM Watson Will Help Battle Cyberattacks
IBM Security is giving its cloud-based cognitive technology Watson a new assignment: cybersecurity. The new Watson for Cyber Security is now in training at IBM to study the nuances of security research findings in order to more effectively discover patterns and hidden cyberattacks. IBM’s X-Force research library will be a central part of the materials … Continue reading IBM Watson Will Help Battle Cyberattacks