Is swipe technology the future of authentication?

Is swipe technology the future of authentication?

The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.

VA security holding in face of mounting threats

VA security holding in face of mounting threats

Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.

What keeps federal CISOs awake at night

What keeps federal CISOs awake at night

Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.

The insider threat in employees’ pockets

The insider threat in employees’ pockets

Five experts offer advice on managing risks when agency employees bring their own mobile devices to work

DOD Enterprise Classified Travel Kit Gateways

DISA comm kits offer secure mobile access

Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.

Microsoft says start practicing now for Windows 10 update cycle

Microsoft says start practicing now for Windows 10 update cycle

IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.

black cloud software defined perimeter

‘Black Cloud’ darkens the enterprise to all but authorized devices

An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.

IoT: Is tech the easy part?

Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.

The hidden costs of “low-cost” surveillance cameras

The hidden costs of “low-cost” surveillance cameras

An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.

Beyond compliance: DISA STIGs’ role in cybersecurity

Beyond compliance: DISA STIGs’ role in cybersecurity

Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.

Hiring cybersecurity staff is hard for states

Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.

FBI seeks cyber threat info-sharing platform

FBI seeks cyber threat info-sharing platform

The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.