SafeWare puts DARPA in the hunt for obfuscated code

SafeWare puts DARPA in the hunt for unbreakable code

DARPA asks researchers to submit proposals for SafeWare, a new approach to code obfuscation that makes software nearly impossible to attack.

FireEye

Cole guides agencies in next-gen cyber warfare

As FireEye's global government liaison, Tony Cole brings governments the technology and insights to thwart a new generation of motivated attackers.

state government cloud solutions

Cloud, cybersecurity solutions earn NASCIO honors

University of Georgia’s private cloud deployment saved it more than $7.5 million compared to public cloud hosting, and Virginia’s focus on two significant attack vectors helped it reduce the frequency of the malware incidents.

computer forensics investigation

4 crime scene mistakes that can sink a cyberforensic investigation

Detectives and information security professionals can learn not only from each other’s best practices, but also from tactics each follow to ensure they are avoiding common mistakes.

Forensic software extracts iPhone data even with iOS 8 encryption

Forensic software extracts iPhone data – even with iOS 8 encryption

Apple's latest security improvements in iOS 8 make iCloud backup acquisition the only way for criminal investigators to access the suspect's smartphone data.

Keep it Simple

3 tips to keep federal networks simple and manageable

With government networks growing more complex, here are three ways network administrators can simplify their approach to managing federal networks.

Washington Navy Yard

An IT office, thrust into the line of fire

The Naval Sea Systems Command’s Information Office, which manages NAVSEA’s IT workforce, was charged with picking up the pieces after a tragedy struck the Navy Yard one year ago.

EtherWatch invisibly protects industrial control systems

EtherWatch invisibly protects industrial control systems

The military-grade cybersecurity appliance eliminates risks associated with operating industrial control systems over networks.

Sun rising behind the US Capitol

GCN names 2014 executives of the year

GCN names Department of Army Deputy CIO Michael Krieger, Central Intelligence Agency CIO Doug Wolfe and FireEye Inc. Global Government Liaison, Tony Cole as 2014 GCN executives of the year.

Cybersecurity playbook

Beyond compliance: Protecting data with automated security playbooks

Security playbooks powered by intelligent automation can mitigate the fallout from breaches while meeting important compliance standards.

How hybrid analytics can mitigate insider threats

How hybrid analytics can mitigate insider threats

Because no single approach can detect every threat, hybrid analytics can help IT managers uncover hidden, suspicious activities and see the bigger picture.

AT&T offers secure links to IBM SoftLayer cloud

AT&T offers secure links to IBM SoftLayer cloud

IBM and AT&T formed a partnership to let customers connect their private IT systems to IBM's SoftLayer cloud using AT&T's NetBond secure virtual private network service.