DOD takes ISIL fight to the deep web

DOD takes ISIL fight to the deep web

DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.

Unknown clouds in the government enterprise

Unknown clouds in the government enterprise

A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.

Postal Service IG wants more analytics muscle

Postal Service IG wants more analytics muscle

U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.

NIST outlines guidance for security of copiers, scanners

The guidance covers protecting information processed, stored or transmitted on replication devices, which are those that copy, print or scan documents, images or objects.

Network visibility fabric

How pervasive traffic visibility can boost network security

A robust monitoring fabric will intelligently filter, correlate, normalize and deliver the appropriate traffic to the agency’s security, monitoring and management systems.

ORNL licenses malware detection technology

ORNL licenses malware detection technology

Hyperion, which can recognize malicious software even if the specific program has not been identified as a threat, was licensed to R&K Cyber Solutions LLC of Manassas, Va.

Following attack, intruders still cooling in State Department network

Following attack, intruders still cooling in State Department network

Four months after a breach and takedown of its unclassified email networks, the State Department has not been able to rid its network of hackers.

Feds to take payments from digital wallets

Digital wallet services give customers options to initiate transactions via the Internet or mobile apps without the need to enroll in a system or provide personal information.

Software freezes devices that fall offline

Software freezes devices that fall offline

Absolute Software Corp.’s Device Freeze Offline Policy lets IT managers set an automated freeze command for any device that remains offline for a specified period of time.

Tech in the crossfire of DHS funding debate

Tech in the crossfire of DHS funding debate

Officials at the Department of Homeland Security have been warning of the consequences to technology programs in the event of a DHS shutdown.

Box adds user-managed encryption keys to enterprise cloud service

Box adds user-managed encryption keys to enterprise cloud

The Box Enterprise Key Management is cloud-enabled content management and collaboration system that gives enterprises full control over encryption keys, while preserving Box user experience.

Tech that helps flag fraudulent tax returns

Tech that helps flag fraudulent tax returns

Because tax fraud is pervasive, governments enlist identity verification technology to ensure refunds go to the correct taxpayer.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.