Privacy accessories for the secure and stylish

Privacy wearables and accessories for the secure – and stylish

After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.

Best practices for emergency preparedness

'Tis the season for emergency preparedness

Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.

Fujitsu launches secure enterprise tablets

Fujitsu launches secure enterprise tablets

Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.

KEMP introduces support for Federal ID smart cards

KEMP introduces support for federal ID smart cards

The provider of software-centric and cloud-focused load balancer solutions now supports integration with Defense Department environments using CAC authentication and Active Directory application infrastructures.

DISA drafts new cloud security requirements

DISA drafts new cloud security requirements

The Defense Information Systems Agency released a draft of cloud computing security requirements for the Defense Department.

Will CDM finally be ‘the realization of IT security’?

Will CDM finally be ‘the realization of IT security’?

Tools and services are being chosen for Phase 2 of the Continuous Diagnostics and Mitigation program, which security watchers say could be a revolutionary step in how the government protects its information.

Can BlackBerry Classic power a comeback?

Can BlackBerry Classic power a comeback?

BlackBerry Classic returns to the old form factor and includes BlackBerry Balance, the technology that allows personal and work data to reside in separate partitions on the device.

App-level approach to mobile management

App-level approach to mobile management

Mobile app management can help government IT pros who want to take advantage of the savings mobile apps bring but still need to secure the enterprise.

‘Gold standard’ for random number generation: radioactive decay

‘Gold standard’ for random number generation: radioactive decay

The technology used to control access to nuclear weapons could secure other applications that use encoded protection, such as communications and the IT supply chain.

What’s next in cybersecurity automation

What’s next in cybersecurity automation

The Department of Homeland Security will explore developing an environment for automated cybersecurity and shared situational awareness.

U. Michigan fronts effort to push HTTPS net security

U. Michigan fronts effort to push HTTPS net security

University of Michigan researchers have formed a group to establish a new HTTPS certificate authority and support their aim to ‘reinvent’ Internet security.

DARPA sees transparent IT as window on new threats

DARPA sees transparent IT as window on new threats

The DOD research agency wants to develop techniques for seeing more deeply into today’s opaque networks to more effectively combat advanced persistent threats.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.