network

Security console provides full network visibility, cuts cost of ownership

The iboss network monitoring console provides packet-level visibility across a network, helping curb conventional and advanced security threats.

key

PC giant Lenovo pledges solution for weak passwords

PC maker Lenovo and Nok Nok Labs, a developer of online authentication systems, form a partnership to offer a standard approach to improving password security and ease of use.

smart cities

Government IT in 2014: More connections, more exposure, more risk

Agencies should expect to see more authentication, increased use of private clouds and the spread of smart city technologies in 2014.

voice

Voice biometrics vie for role in mobile ID tech

Madrid, Spain-based AGNITiO sees a place for voice biometrics in authenticating user ID on smartphones and other mobile devices.

AirMagnet

WLAN monitoring and protection, 24/7

AirMagnet’s monitoring solution for wireless networks helps secure communications and tune network performance.

password

2014: A tipping point for password authentication

With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.

chess

Cyberthreats for 2014: Not just the usual suspects

Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.

Cyber Flag

Cyber Flag exercises sharpen DOD cyber operations and defense

Cyber pros from across the military hone their skills against a realistic adversary on a closed network in an 11-day U.S. Cyber Command exercise.

network security

Firms offer single path to securing cloud and physical networks

VMware and Palo Alto Networks offer integrated platform to unify network security across both physical and virtual cloud enterprises.

cryptography

NTRU crypto software available to open-source community

Security Innovation says offering its public key cryptography for use in open-source community would head off a looming ‘cyrptopocalypse’ caused by limited choice of encryption algorithms.

approved

Symantec gets FISMA certification for shared service products

Two of Symantec's public key infrastructure products receive approval for use by federal agencies and contractors.

letters

Why salted hash is as good for passwords as for breakfast

Encrypted passwords can be vulnerable because a decryption key must be available to the authentication server; hashed passwords cannot be decrypted and must be guessed by an attacker, which can be made impractical.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.