As the U.S. power grid becomes increasingly vulnerable to electromagnetic disruptions—both natural and manmade—the clock is ticking toward possibly catastrophic solar storms that some scientists say are inevitable.
The Homeland Security Department’s Continuous Diagnostics and Mitigation (CDM) program can help ensure that your agency has the proper cybersecurity controls in place. The right CDM tools can also help you identify and eliminate threats in your network before they become breaches.
John Breeden II goes for a virtual reality climb for his weekly NextGov Emerging Technology column. And while The Climb and other games for the Oculus Rift are enough to get the blood pumping, what is really surprising is how some scientists…
When software for complex systems is developed for functionality only, it is fragile and insecure. Standards are emerging for resilient software that mitigates cybersecurity risk.
Advances in quantum computing threaten the cryptographic systems now securing commercial and government communications. NIST is launching an effort to identify post-quantum algorithms that can resist this new paradigm.
IBM Security is giving its cloud-based cognitive technology Watson a new assignment: cybersecurity.
The new Watson for Cyber Security is now in training at IBM to study the nuances of security research findings in order to more effectively discover patterns and hidden cyberattacks.
IBM’s…
Have You invested a lot in your applications and want the full return on your investment? Well, You do not necessarily need to replace your legacy apps, but you do need to manage them.
As the boundary between the real world and cyberspace becomes more blurred, NIST is offering guidance for engineering cybersecurity into increasingly complex physical systems.
The use of IT systems in automobiles is outpacing industry’s ability to secure them, and effective government regulation is likely to be a decade or more away.
A cyberespionage group is using an advanced persistent threat technique that exploits an obscure Windows OS feature known as “hot patching” to cloak backdoors they have created in targeted systems and networks of government agencies and telecommunications companies in Asia and Southeast…
