cybersecurity

How do you protect DNS from hacktivists like SEA?

DNSSEC can be an effective tool -- but only one tool -- in preventing redirection attacks such as those carried out recently by the Syrian Electronic Army.

USPS

The key to getting your money's worth out of IT security tools

Holding the vendor accountable for results — and right away — is the first step in getting value from your cybersecurity investment, said USPS information security officer Chuck McGann.

secure text

R U secure? Encrypted texting expands to Android OS.

Silent Circle releases its latest end-to-end encryption tool, which enables secure texting between Apple iOS and Android platforms. A secure, peer-to-peer email app is due next year.

keys

Key-sharing tech helps combat encrypted DDoS attacks

Prolexic's SSL key-sharing tools make it easier to detect and stop encrypted Layer 7 DDoS attacks while customers maintain control of their SSL keys.

building

How USPS merges compliance, security in its huge enterprise

The Postal Service now is using the RedSeal network monitoring platform, originally intended to evaluate firewall rules, to improve situational awareness and operational security across its extended enterprise.

automation

Agencies must put more emphasis on automation

Defending against the steady growth in cyberattacks requires continuous monitoring and automated responses, and that could mean shifting resources.

security

Group releases draft specs on ID tools for network devices

The proposed profile builds on TCG’s network security architecture to ensure the identity and security status of all devices connecting to a network.

Akamai

Akamai global network receives FedRAMP security approval

Akamai becomes first provider of distributed content and application delivery services to receive authority to operate cloud services under the government’s FedRAMP cloud security program.

students

University cybersecurity: Different, but still the same

Academic environments are built around sharing information, but securing their networks — and the mobile devices that use them — calls for the same layered approach other organizations use.

mobile device passcode

Which sectors require passcodes for mobile device access?

A sampling of smartphones and tablets by Fiberlink Communications shows government is more likely than other sectors to require strong passcodes for mobile devices.

PSIM

Tech, tactics behind CitiWatch’s large-scale video surveillance system

A video surveillance system that combines thousands of cameras requires more than technology to be effective.

locks

One ID for many sites? How a federated credential exchange works.

SecureKey, selected by USPS for the FCCX pilot, already provides a similar bridge service for the Canadian government. FCCX is expected to work much the same way.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.