HawkEye G adds threat analytics, third-party integration

HawkEye G adds threat analytics, third-party integration

The platform corroborates actual endpoint behavior with third-party data to help capture, analyze and remove malicious activity before it compromises resources.

Data-driven government

Salary shortfalls and scary skill gaps

A new NASCIO study details state governments' struggles to recruit and retain IT talent.

New tool boosts threat protection inside the perimeter

New tool boosts threat protection inside the perimeter

The iboss FireSphere Threat Isolator integrates the company’s advanced persistent threat solution with HP’s software-defined networking architecture.

SMB security flaw in Windows? Not really, says Microsoft

SMB security flaw in Windows? Not really, says Microsoft

Security researchers say they’ve uncovered a new technique for stealing login credentials from any Windows device, but Microsoft says it addressed the issue in 2009.

army seeks support for XP devices

Army seeks alternative for Windows XP support

According to a recent RFI, the Army will be ending its support contract with Microsoft but wants to ensure it can still avoid security vulnerabilities on its 8,000 Microsoft Windows XP devices.

solid password advice from an unexpected source

'Passwerd' is bad. Try 'Margaretthatcheris110%sexy'

Some solid password advice from an unexpected source.

'Polymorphic' botnet draws international attention

Beebone, or AAEH, allows multiple forms of malware to compromise security on a wide range of operating systems.

What two-factor authentication could really accomplish in government

What two-factor authentication could really accomplish in government

An upgrade to a chip-and-PIN cards for Social Security, Medicare and employment verification would enhance personal privacy, secure identities and prevent fraud.

Built-in security enables cyber resilience

Built-in security enables cyber resilience

Agencies need to protect systems from software vulnerabilities that compromise availability, integrity and security.

General Dynamics

General Dynamics' high-speed encryptor now NSA certified

Providing end-to-end 10 gigbit/sec throughput speed, General Dynamics Mission Systems' TACLANE-10G secures information classified Top Secret and below over government and commercial networks.

Get ready for wearables

Get ready for wearables

Though we may be years away from significant adoption, it’s important for government agencies to begin incorporating wearables into their security planning now.

How hard is it to permanently delete data?

How hard is it to permanently delete data?

Even though Hillary Clinton deleted her email, experts can probably recover it.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.