Belkin DisplayPort Secure KVM

Secure KVM switch a good fit for government

Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.

social media

How agencies can take social media through the FISMA process

Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.

Training for those with cybersecurity responsibilities

Training the cyber workforce to handle new threats

Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.

top 10

Users offer 10 security tips to IT staff

A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.

Businessman examining code

NSA's reported tampering could change how crypto standards are made

NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.

Encrypted email

Alliance aims to develop spy-proof email

Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.

keystroke

Keystroke encryption coming for Apple, Android phones

GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.

phishing

Internet Explorer leads in tests against social engineering threats

Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.

audio

5 ways to protect audio and microphones from malicious exploits

Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.

hacker

Military, NASA other agencies hit in series of attacks

A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.

HP ZBook 15

HP laptop has workstation power, gov-level security

The ZBook 15 is a powerful workstation in every way except size and shape.

binary

How quantum key distribution works

QKD uses a photon's polarization and spin to verify an unobserved key transmission.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • Big Data Integration and Analytics for Cyber Security

    Conventional methods for mitigating cyber-attacks are no longer sufficient. Big data analytics — along with an advanced, more strategic approach to network security — is needed to disrupt adversary tools and techniques, and render them ineffective.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.