Author Archive
Brian Robinson
Brian Robinson is a freelance technology writer for GCN.
Infrastructure
Legacy systems: Too old to die?
Some legacy systems will likely never move to modern platforms, but agencies must get smarter about what to migrate and how.
- By Brian Robinson
Cybersecurity
New breach, same lessons
The Equifax breach has brought the security of open source software to the fore, yet again, and highlighted the ongoing struggle organizations still have with cybersecurity.
- By Brian Robinson
Cybersecurity
Software brittleness may harden embedded systems
Brittleness causes programs to fail fast when under attack, which allows systems to quickly detect and disrupt cyberattacks and revert to known-good states.
- By Brian Robinson
Cybersecurity
NIST's how-to for prioritizing risk
The latest guidance on risk assessment offers agencies a way to identify the most critical parts of an infrastructure so they can better choose what to upgrade.
- By Brian Robinson
Cybersecurity
IARPA explores easy-to-use cryptography
A new program will look at developing tools that architects and programmers can use without having to understand the nuances of specific cryptographic concepts.
- By Brian Robinson
Cybersecurity
Computing with encrypted data
Researchers are working on ways to optimize fully homomorphic encryption, which allows manipulation of encrypted data, for real-world applications.
- By Brian Robinson
Cybersecurity
WannaCry: A preview of coming attacks?
With malware innovations seemingly outpacing the efforts of both public and private entities to protect against them, we must find a new way to deal with the issues malware poses.
- By Brian Robinson
Infrastructure
How to implement enterprise-to-cloud security
Placed between cloud service providers and users, cloud access security broker solutions enforce an enterprise’s security policies.
- By Brian Robinson
Cybersecurity
The road to derived mobile credentials
Programs in both the civilian and military sectors are starting to deliver on earlier promises to give government workers credentials on their mobile devices.
- By Brian Robinson
Cybersecurity
Jumping on the blockchain bandwagon
This could be the year when blockchain hype dissipates and it becomes a major, if still early-stage, cybersecurity tool.
- By Brian Robinson
Cybersecurity
The cyber curse of ‘interesting times’
This year will be a critical one for cybersecurity, with both government and industry coming to grips with what’s needed to counteract the rapidly rising tide of attacks.
- By Brian Robinson
Cybersecurity
NIST looks for defense against code-cracking quantum machines
Pulling together quantum-resistant cryptography will take time, and NIST feels that, unless it starts now, that new cryptography won’t be ready.
- By Brian Robinson
Digital Government
Mobile apps added to NIST software database
The investigator's digital forensics toolkit expands with the addition of 23,000 mobile apps to the National Software Reference Library.
- By Brian Robinson
Cybersecurity
Are states ill-equipped to manage cybersecurity?
State governments have been under constant pressure to modernize their IT systems, improve service delivery and cut costs. Along the way, something is bound to break.
- By Brian Robinson
Digital Government
Quantum computing: Probable solutions incredibly fast
Although mainstream quantum computing is still years off, agencies are starting to experiment with D-Wave machines for optimization problems.
- By Brian Robinson
Cybersecurity
Get ready for IoT-enabled threats
The success of the recent Mirai botnet attacks opens the door for similar DDoS threats that take advantage of unsecured Internet of Things devices.
- By Brian Robinson
Cybersecurity
Moving cybersecurity from art to science
New technologies and cyber-savvy leadership are taking the intuition and guesswork out of security.
- By Brian Robinson
Cybersecurity
NIST offers cyber self-assessment tool, updates email security guidance
The National Institute of Standards and Technology has come out with a self-assessment tool that should give organizations a better understanding of how they are progressing with security risk management efforts.
- By Brian Robinson
Cybersecurity
Real-time monitoring for industrial controls
A new platform by startup Claroty examines network traffic using an inspection engine designed for critical infrastructure's IC systems.
- By Brian Robinson
Cybersecurity
Lessons from the OPM breach
The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.
- By Brian Robinson