The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.
Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.
Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.
The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.
The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.
A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.
DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.
A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.
U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.
The guidance covers protecting information processed, stored or transmitted on replication devices, which are those that copy, print or scan documents, images or objects.
A robust monitoring fabric will intelligently filter, correlate, normalize and deliver the appropriate traffic to the agency’s security, monitoring and management systems.
Hyperion, which can recognize malicious software even if the specific program has not been identified as a threat, was licensed to R&K Cyber Solutions LLC of Manassas, Va.