The updated security controls in NIST SP 800-53 give administrators more flexibility and put a greater focus on IT systems with built-in security.
The first product of the NCCOE is a demonstration of a geolocation scheme to let end users validate that work being done in the cloud is being done in a secure location.
NIST's National Cybersecurity Center of Excellence plans to add a federally funded center to help accelerate adoption of existing cybersecurity technology.
Data Device's new tabletop degaussing machine can destroy the data on a hard drive in 45 seconds.
As denial of service attacks become more frequent and powerful, agencies need to take steps to prepare, from new arrangements with ISPs to establishing low-bandwidth alternate communications.
Servers being bombarded by requests is a nuisance, but when attacks come in conjunction with an emergency, they can lead to trouble.
The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.
The CIO Council has identified Attribute Based Access Control as a tool for enabling information sharing across government, and NIST is developing guidelines. But it won't be easy.
The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.
The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.
As attacks increase in power, efficiency and duration, operators may have to use black holes to protect their networks.
Attacks from botnets are increasing in bandwidth and, significantly, packet rates, a Prolexic report says.