Fingerprint authentication for mobile cloud device

6 steps to secure mobile access

The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.

Blackholing stops DDOS attacks but shuts off all traffic

Blackholing stops DDOS attacks but consumes everything else too

As attacks increase in power, efficiency and duration, operators may have to use black holes to protect their networks.

DDOS acks increasing

DDOS attacks turn up the volume

Attacks from botnets are increasing in bandwidth and, significantly, packet rates, a Prolexic report says.

iPhone has most vulnerabilities but Android is the most attacked

iPhone has most vulnerabilities, so why is Android the most attacked?

Android, with only a handful of vulnerabilities reported in 2012, was the OS of choice for malware writers, Symantec says.

Image of aftermath of the Boston Marathon bombing by Vjeran Pavic via Flickr

How video analytics helps reconstruct Boston Marathon bombings

Analyzing terabytes of footage from events such as the Boston Marathon bombings is still a largely manual task, but video analytics tools can save investigators a lot of time.

Checking computer memory

Group aims to draw the line on counterfeit IT

The Open Group's standard could help government ensure that COTS products do not contain backdoors or counterfeit components.

One worker in an empty cubicle farm

6 steps to secure systems for sequester

Patches, idle accounts, mobile devices not in use and, yes, disgruntled workers have to be accounted for.

Big ship in fog bearing down on man in rowboat crisis management

Hacks happen. Security Module can help agencies navigate crisis response

Co3's system can help agencies identify an attack or breach, in part by putting users on the case, and then lead officials through the response.

Computer system checks out as clean

Digital certificates need to regain users' trust

In the face of growing use of stolen and fake certificates to deliver malicious code, NIST and an industry alliance are working to improve what has become an automated, online process.

City traffic controls have Internet connections

'Scary' search engine can find millions of agency back doors

Shodan scours the Web for connected devices that aren't looking to be found, such as traffic lights, door locks and power systems. And many of them aren't secured.

Man on cliff with cloud background illustrating that cloud choices may be too risky

Free cloud storage is tempting, but is the price too high?

The services have obvious appeal to employees, but have a history of breaches. Pennsylvania's CISO, for one, steers agencies to in-house or enterprise storage services.

New York City Police Department call center

Phone-DOS attacks in extortion scam target gov offices

Government offices, including Public Safety Answering Points, are being flooded with calls to block phone lines in an extortion scam that shows how easy such attacks can be, according to a DHS alert.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.

  • Zero Trust Approach to Network Security

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. Read this whitepaper to learn about the effectiveness of a Zero Trust security model in addressing the shortcomings of failing perimeter-centric strategies.

  • Stalking the Kill Chain

    Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field