Encryption via quantum computing

Unbreakable encryption remains a pipe dream, even on a quantum Internet

Despite efforts to use the principles of quantum computing to create unbreakable encryption, the system fails outside a lab or highly controlled setting.

Security control room at QTS Richmond data center

QTS opens secure cloud test lab for government

Facility in Richmond, Va., will speed up development and deployment of secure cloud computing services

WiebeTech Ditto Forensic FieldStation

Forensic FieldStation brings stealth to hard drive data capture

It runs silent, can turn off its lights and be operated remotely by a technician who doesn't have to join investigators or a covert team in the field.

Man installing new roof with tornado in background

New strategy for IT security: Focus on the systems, not the threats

The updated security controls in NIST SP 800-53 give administrators more flexibility and put a greater focus on IT systems with built-in security.

Data secured in the cloud

How to ensure trusted geolocation of data in the cloud

The first product of the NCCOE is a demonstration of a geolocation scheme to let end users validate that work being done in the cloud is being done in a secure location.

NIST cybersecurity building blocks

R&D center to offer 'building blocks' of cybersecurity

NIST's National Cybersecurity Center of Excellence plans to add a federally funded center to help accelerate adoption of existing cybersecurity technology.

DataGauss tabletop electronic media destruction unit

DataGauss fast way destroy hard drives

Data Device's new tabletop degaussing machine can destroy the data on a hard drive in 45 seconds.

Firefighter working a forest fire

12 steps that can help agencies fight DDOS attacks

As denial of service attacks become more frequent and powerful, agencies need to take steps to prepare, from new arrangements with ISPs to establishing low-bandwidth alternate communications.

Network adminstrator dealing with DDOS attack while city burns in background

When DDOS attacks become real threats

Servers being bombarded by requests is a nuisance, but when attacks come in conjunction with an emergency, they can lead to trouble.

Kingston DataTraveler 4000 and DataTraveler Vault Privacy secure USB flash drives

Kingston adds malware scanner to its secure drives

The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.

Attribute Based Access Control matches attributes of a person requesting access as well as attributes of the resources being requested against a policy

Is ABAC a better method for secure info sharing?

The CIO Council has identified Attribute Based Access Control as a tool for enabling information sharing across government, and NIST is developing guidelines. But it won't be easy.

AOptix iphone biometric tool

App, case turns iPhone into on-the-spot biometric scanner

The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.