Most experts agree that you can't do it all by yourself, but there are practical measures agencies can take to shore up their networks against denial of service attacks.
Denial of service attacks on the Domain Name System are becoming common, but an effective defense will require a few rule changes.
Treating DOS attacks like a man-made disaster can help agencies determine the proper communication and technical response.
Brute-force denial of service attacks against networks are still the most common, but hackers are increasingly moving toward more efficient attacks on applications.
The flood of bandwidth in the hands of attackers can overwhelm agency resources, making in-house defense impractical. You need allies outside your network.
As DOD moves into cloud computing, pilots and projects look to assess risk and develop multiple layers of network defense.
Lax security could soon threaten the gains agencies have made by letting employees use their own mobile devices for work, a new study says. There are basic protective steps agencies can take now.
NIST offers a scheme for trusted geolocation, a way to ensure that resources agencies use in the cloud are kept secure.
NIST is considering Format-Preserving Encryption schemes that could let agencies keep data hidden while in transit or in use by an application.
Forget 2013; that's old news already. Researchers at the security company Internet Identity are looking ahead to 2014, and what they see isn't pretty.
As defenses get better and the bad guys get more creative, the threats will become more complex and the risks greater in the coming year.
The National Strategy for Trusted Identities in Cyberspace is considering commercial cloud services for authenticating third-party credentials of users accessing government websites.