Training for those with cybersecurity responsibilities

Training the cyber workforce to handle new threats

Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.

top 10

Users offer 10 security tips to IT staff

A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.

Businessman examining code

NSA's reported tampering could change how crypto standards are made

NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.

Encrypted email

Alliance aims to develop spy-proof email

Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.

keystroke

Keystroke encryption coming for Apple, Android phones

GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.

phishing

Internet Explorer leads in tests against social engineering threats

Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.

audio

5 ways to protect audio and microphones from malicious exploits

Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.

hacker

Military, NASA other agencies hit in series of attacks

A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.

HP ZBook 15

HP laptop has workstation power, gov-level security

The ZBook 15 is a powerful workstation in every way except size and shape.

binary

How quantum key distribution works

QKD uses a photon's polarization and spin to verify an unobserved key transmission.

power lines

Threats to privacy become a focus of Smart Grid planning

NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.

photon

Can quantum cryptography work in the real world?

Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.