Man with virtual monitors

Big data takes on the kill chain

Big data systems can correlate structured and unstructured data to paint a complete picture about an agency’s overall IT health and offer insight into the sophisticated threats.

ID management schematic

Cloud service simplifies certificate management, credentialing

Entrust IdentityGuard cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing.

IT manager heartbleed data center

Heartbleed prognosis: Long, laborious discovery, recovery

Described as "one of the scariest bugs I've seen" by a DOD technical analyst, Heartbleed could leave agency systems from enterprise email to Web sites vulnerable to attack.

Computer security combination lock on keyboard

ID resolution software helps thwart fraud rings

FICO's 50+ algorithms scour multiple data sources to help defeat criminal rings that perpetrate money laundering, insider fraud and other crimes.

Credential management

Government's credential exchange to go live soon

The Federal Cloud Credential Exchange, hosted by the Postal Service, is expected to be in operation this spring, providing a cloud-based identity hub for agencies.

People viewing MI Bridges portal

State pilots test ID management for online services

Michigan and Pennsylvania are testing identity proofing and enabling federated use of secure credentials for online access to government services.

Windows XP keyboard

Better late than never: 5 steps to mitigating XP risks

Even without Microsoft support, agencies can mitigate (but not eliminate) security risks to lingering XP users.

Transportation Security Operations Center

Infrastructure maintenance takes largest piece of DHS IT spending pie

Much of the focus at the Department of Homeland Security has been on improving data sharing among agencies, according to IDC Government Insights.

social media security threats

Agencies can get relief from social-launched attacks

Analytics software identifies threats to agencies from hackers who use social media sites to launch attacks.

Clouds over Washington DC

Microsoft preps its government cloud

Microsoft aims to make its government-centric cloud as close to the commercial version of Azure as possible, while offering security assurances such as the FedRAMP seal of approval.

distrustful business partners

When everybody lies: Voice-stress analysis tackles lie detection

Voice-stress analysis can help agencies assess a variety of human risk factors. But so far no technology is 100 percent accurate or foolproof.

securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.

  • Zero Trust Approach to Network Security

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. Read this whitepaper to learn about the effectiveness of a Zero Trust security model in addressing the shortcomings of failing perimeter-centric strategies.

  • Stalking the Kill Chain

    Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field