building

How USPS merges compliance, security in its huge enterprise

The Postal Service now is using the RedSeal network monitoring platform, originally intended to evaluate firewall rules, to improve situational awareness and operational security across its extended enterprise.

automation

Agencies must put more emphasis on automation

Defending against the steady growth in cyberattacks requires continuous monitoring and automated responses, and that could mean shifting resources.

security

Group releases draft specs on ID tools for network devices

The proposed profile builds on TCG’s network security architecture to ensure the identity and security status of all devices connecting to a network.

Akamai

Akamai global network receives FedRAMP security approval

Akamai becomes first provider of distributed content and application delivery services to receive authority to operate cloud services under the government’s FedRAMP cloud security program.

students

University cybersecurity: Different, but still the same

Academic environments are built around sharing information, but securing their networks — and the mobile devices that use them — calls for the same layered approach other organizations use.

mobile device passcode

Which sectors require passcodes for mobile device access?

A sampling of smartphones and tablets by Fiberlink Communications shows government is more likely than other sectors to require strong passcodes for mobile devices.

PSIM

Tech, tactics behind CitiWatch’s large-scale video surveillance system

A video surveillance system that combines thousands of cameras requires more than technology to be effective.

locks

One ID for many sites? How a federated credential exchange works.

SecureKey, selected by USPS for the FCCX pilot, already provides a similar bridge service for the Canadian government. FCCX is expected to work much the same way.

PSIM

Force multiplier: PSIM leverages video surveillance networks in Baltimore

With thousands of cameras providing round-the-clock surveillance of Baltimore, the CitiWatch surveillance program turned to a video analysis platform from VidSys to help make sense of all of the data.

key

USPS set to put federal ID system to the test

The Postal Service will set up a pilot of the Federal Cloud Credential Exchange this fall and begin testing in January, using SecureKey briidge.net Exchange, which already provides similar services for the Canadian government.

cloud

What's in the future for FedRAMP?

The program could move to cover high security requirements or standardize service-level agreements for agencies and providers.

cloud

FedRAMP approval is fine, but it's just the beginning

The program's standardized security controls can cover basic services like email and backup storage, but after that it gets complicated.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.

  • Zero Trust Approach to Network Security

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. Read this whitepaper to learn about the effectiveness of a Zero Trust security model in addressing the shortcomings of failing perimeter-centric strategies.

  • Stalking the Kill Chain

    Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field