Stanford University

Stanford probes breach as attacks on university networks soar

The source of an apparent breach of Stanford University's network is unknown, but it comes as universities are seeing an exponential increase in attacks on their networks.

Monitoring network traffic for insider threats

How technical monitoring can help defend against insider threats

Organizations can take steps to protect their data from network and server administrators who go rogue.

Image of Albert Einstein framed by digital keyhole

Einstein 3 goes live with automated malware blocking

The government's new intrusion prevention system will not only detect malicious traffic but stop that traffic before it does harm.

Monster coming out of the back of a laptop

The mutating malware monster demands new defenses

Revised guidance from NIST on defending against malware reflects the evolution of malicious code, which is becoming more complex, dangerous and difficult to detect.

Belkin KVM

Belkin brings secure KVM to DisplayPort

The switch, the first secure KVM for Display Port, would allow government users to access secure and nonsecure networks using a single monitor.

Close up of an iris scan with a PIV card in the pupil

Smart ID to offer options for iris scanning, on-card fingerprint matching

Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.

Dell Latitude 10 Enhanced Security

Tablets for government: Dell Latitude 10 Enhanced Security

The Latitude's user authentication features will please admins, but users won't love the limited battery power.

Two hands on keyboard one with black glove indicating hacker

Spy agencies look for tools to automate enforcement of two-man-rule for access

The intell community taps HyTrust to help enforce the two-man rule for administrative access to sensitive information in the cloud in the wake of Snowden's disclosures about domestic spying.

Panda Cloud Systems Management

Panda Security expands antivirus protection for government clouds

The Panda Cloud Systems Management promises to give agencies and service providers control over all software on their networks.

Cipher USB FLE F1 from Addonics Technologies

Cipher provides an easy way to secure USB drives

The Cipher USB FLE from Addonics, which itself looks like a key drive, can encrypt files on any drive or host PC.

Emergency Alert System vulnerability

EAS vulnerability exposes the soft underbelly of firmware

Sensitive keys included in freely available firmware opened the Emergency Alert System to attack, and researchers say the incident could be just the tip of the iceberg.

IT adminstrator upgrading server software

20 critical controls do improve cybersecurity, but are you using them?

A survey of security pros shows a high awareness of the 20 Critical Security Controls, but implementation is not yet mature. Government appears to be ahead of the curve.

Topic Resources

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.

  • All About Self-Encrypting Drives

    With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.

  • Continuous Monitoring to Achieve Cybersecurity

    As the cyber threat landscape evolves, security methods and tools need to change, too. In this Digital Dialogue, Ken Durbin, manager of Continuous Monitoring Practice at Symantec, explains how the undefined boundaries of the modern IT infrastructure necessitate the deployment of continuous monitoring solutions.

  • Stopping Zero-Day Exploits for Dummies

    Cyber attacks are growing every day and can become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you will discover the zero-day exploits and threats used to compromise your agency.