IT manager heartbleed data center

Heartbleed prognosis: Long, laborious discovery, recovery

Described as "one of the scariest bugs I've seen" by a DOD technical analyst, Heartbleed could leave agency systems from enterprise email to Web sites vulnerable to attack.

Computer security combination lock on keyboard

ID resolution software helps thwart fraud rings

FICO's 50+ algorithms scour multiple data sources to help defeat criminal rings that perpetrate money laundering, insider fraud and other crimes.

Credential management

Government's credential exchange to go live soon

The Federal Cloud Credential Exchange, hosted by the Postal Service, is expected to be in operation this spring, providing a cloud-based identity hub for agencies.

People viewing MI Bridges portal

State pilots test ID management for online services

Michigan and Pennsylvania are testing identity proofing and enabling federated use of secure credentials for online access to government services.

Windows XP keyboard

Better late than never: 5 steps to mitigating XP risks

Even without Microsoft support, agencies can mitigate (but not eliminate) security risks to lingering XP users.

Transportation Security Operations Center

Infrastructure maintenance takes largest piece of DHS IT spending pie

Much of the focus at the Department of Homeland Security has been on improving data sharing among agencies, according to IDC Government Insights.

social media security threats

Agencies can get relief from social-launched attacks

Analytics software identifies threats to agencies from hackers who use social media sites to launch attacks.

Clouds over Washington DC

Microsoft preps its government cloud

Microsoft aims to make its government-centric cloud as close to the commercial version of Azure as possible, while offering security assurances such as the FedRAMP seal of approval.

distrustful business partners

When everybody lies: Voice-stress analysis tackles lie detection

Voice-stress analysis can help agencies assess a variety of human risk factors. But so far no technology is 100 percent accurate or foolproof.

securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

digital surveillance

System to continuously scan behavior of cleared workers

U.S. intelligence agencies are planning to thwart insider threats with a system for automated, continuous monitoring of the background and behavior of government workers with secret clearances.

Isolate XP computers from the network

Microsoft ends support for XP next month. Are you ready?

As Microsoft ends support of Windows XP in April, here are steps to prepare for transitioning to a new OS.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.