By George Romas Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. Not bad, but suppose policy requires ...
Posts Tagged: Computing
By RyanKamauff The Cloud & Virtualization Conference will provide a forum for showcasing best practices in securely migrating to next-generation computing platforms and developing cloud infrastructures. The Cybersecurity Conference focuses on the essential defensive security solutions from both ...
Here is today’s federal cybersecurity and information technology news: A U.S. federal appeals court found that authorities do not need a probable-cause warrant to track suspects through their mobile phone GPS. More here. A new bill, the Wireless Surveillance Act of 2012, has been proposed, ho...
Researchers at Kapersky Lab recently concluded that Apple is an entire decade behind Microsoft at malware protection, pointing to the spate of Flashback attacks and Apple’s slow response. Kapersky predicting a coming wave of malware as OSX viruses, once rare, grow to be as common as those ai...
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies. NIST Director Patrick Gallagher, at ceremonies on Feb. ...
A “distributed denial of service” attack – or what security gurus call a DDoS attack – is a little like what happens to Groundhog.org on Groundhog Day. For 364 days out of the year, nobody cares about groundhog fun facts. And then on Groundhog Day-BOOM! Third-graders, Bill Mu...
The Defense Department should give its CIO more responsibility to drive data center consolidation and the move to cloud computing throughout the military, a defense advisory board says in a new report....
The U.S. government was at the forefront of the race to petascale computing–that’s a quadrillion calculations per second for those of you counting–with computers like Los Alamos National Lab’s Roadrunner and Oak Ridge National Lab’s Jaguar, and Congress has now thrown i...