Access controls

Access controls fall short in most agencies

According to the GAO, inadequate access control is a common weakness across 24 major agencies.

Persistence tech offers layered approach to security

Persistence tech offers layered approach to security

While data and device encryption is the first line of defense, it is not impervious to attack, so diligent IT departments should take a layered and persistent approach to security.

Hand below security icons

3 elements for success for the FISMA High cloud

When government agencies combine solutions from cloud providers with third-party products, they can set up monitoring and access controls to provide the same data integrity they would expect from their own systems.

Firemen running

DC tests ID management for first responders

The challenges of controlling physical access in emergencies may be solved by a nationwide network of standard first responder credentials.

Technology transfer

DHS helps new tech survive research lab growing pains

Homeland Security Department’s Transition to Practice program helps software out of the lab and into agencies.

7 steps to protect against privilege-elevating hacks

7 steps to protect against privilege-elevating hacks

Agencies are cracking down on administrative access to mitigate the damage an insider can cause, but hackers are adjusting their tactics as well and aiming them squarely at the federal government.

DHS gets dashboard to drive continuous monitoring

DHS seeks dashboard to drive continuous monitoring

The Archer monitoring and compliance platform from RSA is a finalist to provide a dashboard for Continuous Diagnostics and Mitigation that will give enterprise visibility into the security of federal IT systems.

SAIC debuts tiered cybersecurity solution

SAIC debuts tiered cybersecurity solution

The company's data CyberSecurity Edge ensures customers' systems and information are protected from cyber risks across multiple platforms.

Drupal-based defense-in-depth strategy protects data

Drupal-based defense-in-depth strategy protects data

With open-source Drupal as the foundation of a defense-in-depth strategy, agency IT managers can analyze and identify potential threat vectors, including internal and external threats.

Researchers work to harden cyber infrastructure from WMD

Researchers work to harden cyber infrastructure from WMD

The University of New Mexico will conduct field tests of recovery solutions for cyber-infrastructure backbone attacks from weapons of mass destruction and other real-world threats.

Agencies struggle to document responses to cybersecurity incidents

How good is your agency's incident response?

A GAO study finds that as the number of cybersecurity incidents in government information systems is increasing, agencies are having a tough time fully documenting their responses to these incidents.

7 tactics for a smooth cloud migration

7 tactics for a smooth cloud migration

Before making the jump to the cloud, IT managers need to lay the groundwork, ensuring the right technology and security protocols are in place as well as a complete understanding of the regulatory issues affecting the project.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.