cryptography

NTRU crypto software available to open-source community

Security Innovation says offering its public key cryptography for use in open-source community would head off a looming ‘cyrptopocalypse’ caused by limited choice of encryption algorithms.

approved

Symantec gets FISMA certification for shared service products

Two of Symantec's public key infrastructure products receive approval for use by federal agencies and contractors.

letters

Why salted hash is as good for passwords as for breakfast

Encrypted passwords can be vulnerable because a decryption key must be available to the authentication server; hashed passwords cannot be decrypted and must be guessed by an attacker, which can be made impractical.

plant

DLA using botanical DNA to prevent tech counterfeiting

The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.

Stratus

Secure, compact PC stack arranges to meet government needs

The multi-client Stratus includes three PCs and a remote controlled KVM to deliver security and convenience to government users who need to operate multiple PCs.

GPS

The serious side of GPS, where timing is everything

Although most widely known as a feature in consumer products, GPS timing and positioning is used in much of the nation's critical infrastructure, from managing air traffic to time-stamping financial transactions.

secure cloud

Is FedRAMP working? It better.

It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.

shared services

Lack of awareness slows cloud shared services, providers say

In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.

Belkin DisplayPort Secure KVM

Secure KVM switch a good fit for government

Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.

social media

How agencies can take social media through the FISMA process

Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.

Training for those with cybersecurity responsibilities

Training the cyber workforce to handle new threats

Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.

top 10

Users offer 10 security tips to IT staff

A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.