Senate, DSS eyeing threat scanning systems

Senate, DSS eyeing threat scanning systems

The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.

Best sources of actionable threat intelligence

Best sources of actionable threat intelligence

Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.

Agencies navigate the identity-based security ecosystem

Agencies navigate the identity-based security ecosystem

Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.

FAA leaves air traffic system open to security risk, says GAO

FAA leaves air traffic system open to security risk, says GAO

The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.

Array Networks introduces FIPS-compliant gateway

Array Networks introduces FIPS-compliant gateway

The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.

How to keep legacy systems from becoming liabilities

How to keep legacy systems from becoming liabilities

A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.

DOD takes ISIL fight to the deep web

DOD takes ISIL fight to the deep web

DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.

Unknown clouds in the government enterprise

Unknown clouds in the government enterprise

A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.

Postal Service IG wants more analytics muscle

Postal Service IG wants more analytics muscle

U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.

NIST outlines guidance for security of copiers, scanners

The guidance covers protecting information processed, stored or transmitted on replication devices, which are those that copy, print or scan documents, images or objects.

Network visibility fabric

How pervasive traffic visibility can boost network security

A robust monitoring fabric will intelligently filter, correlate, normalize and deliver the appropriate traffic to the agency’s security, monitoring and management systems.

ORNL licenses malware detection technology

ORNL licenses malware detection technology

Hyperion, which can recognize malicious software even if the specific program has not been identified as a threat, was licensed to R&K Cyber Solutions LLC of Manassas, Va.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.