AirMagnet

WLAN monitoring and protection, 24/7

AirMagnet’s monitoring solution for wireless networks helps secure communications and tune network performance.

password

2014: A tipping point for password authentication

With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.

chess

Cyberthreats for 2014: Not just the usual suspects

Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.

Cyber Flag

Cyber Flag exercises sharpen DOD cyber operations and defense

Cyber pros from across the military hone their skills against a realistic adversary on a closed network in an 11-day U.S. Cyber Command exercise.

network security

Firms offer single path to securing cloud and physical networks

VMware and Palo Alto Networks offer integrated platform to unify network security across both physical and virtual cloud enterprises.

cryptography

NTRU crypto software available to open-source community

Security Innovation says offering its public key cryptography for use in open-source community would head off a looming ‘cyrptopocalypse’ caused by limited choice of encryption algorithms.

approved

Symantec gets FISMA certification for shared service products

Two of Symantec's public key infrastructure products receive approval for use by federal agencies and contractors.

letters

Why salted hash is as good for passwords as for breakfast

Encrypted passwords can be vulnerable because a decryption key must be available to the authentication server; hashed passwords cannot be decrypted and must be guessed by an attacker, which can be made impractical.

plant

DLA using botanical DNA to prevent tech counterfeiting

The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.

Stratus

Secure, compact PC stack arranges to meet government needs

The multi-client Stratus includes three PCs and a remote controlled KVM to deliver security and convenience to government users who need to operate multiple PCs.

GPS

The serious side of GPS, where timing is everything

Although most widely known as a feature in consumer products, GPS timing and positioning is used in much of the nation's critical infrastructure, from managing air traffic to time-stamping financial transactions.

secure cloud

Is FedRAMP working? It better.

It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.

Topic Resources

  • Big Data Integration and Analytics for Cyber Security

    Conventional methods for mitigating cyber-attacks are no longer sufficient. Big data analytics — along with an advanced, more strategic approach to network security — is needed to disrupt adversary tools and techniques, and render them ineffective.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.