Cyber attack on network

Why is Java so risky? 77 percent of agencies run unsupported versions

Three quarters of government computers are running unsupported versions of Java, according to a Websense analysis, leaving them vulnerable to a long list of malicious exploits.

Data numbers binary

Can NASA vet all material in its shuttered tech database?

NASA closed down its Technical Reports Server for review after the arrest of a suspected spy and a congressman’s concern over the potential availability of sensitive documents.

Fingerprint electronic matching AFIS

Law enforcement, NIST making fingerprint files easier to search

Group has developed a standard features set to use for fingerprint identification, and NIST now has the technical specs to make searches interoperable.

HIPAA compliance monitoring of USF health system

Compliance tool the cure for university's health records

The new Compliance Software Blade lets USF Health easily answer the question, "How are we doing on compliance?"

Man with suitcase chasing train

Why the public sector is still catching up with proactive cybersecurity

If agencies are to stop being reactive in addressing cybersecurity, they must first change the way security is implemented on the ground floor.

Firewall fire in front of brick wall

Next-generation firewalls are actually getting better

Firewall vendors are stepping up to improve performance and fix problems, according to the results of the most recent comparative tests conducted by NSS Labs.

Aegis Secure Key

Tamper-proof key drive gets Level 3 validation

The Aegis Secure Key, with a numeric keypad and 256-bit AES encryption, meets the standards for FIPS 140-2 Level 3.

Man repairing an exposed wall

Agencies' security efforts stall, report says

OMB's FISMA report says performance varied widely among agencies, though there was progress in three key areas.

Businessmen having a private conversation in a tunnel

How to secure mobile comm? Cut out the trusted third party.

The Silent Circle crypto service could solve BYOD security through peer-to-peer encryption, and although that could keep authorities from snooping on calls, military and intelligence agencies are getting on board.

Complex maze with cloud in background

The enemy of risk management starts with a C (and it's not China)

Complexity is the enemy of security, says NIST's FISMA lead Ron Ross, and the cloud can help simplify networks.

Business people meeting against a backdrop of financial pricing data

Financial ISAC shows how info sharing beefs up security

The Financial Services Information Sharing and Analysis Center, a collaborative effort on the cyber defense of the financial sector, was honored with the RSA Conference's information security award.

Pentagon and Washington DC covered in snow

BYO3: The tools of telework expand with the mobile workforce

Telework Week gets tens of thousands of feds to try working from home, and they're not all using an agency-issued laptop.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • Video Surveillance: Emerging Solutions for Securing Agency Assets

    Please note that this webcast, originally scheduled for 10/16, from 2:00-3:00pm ET, has been rescheduled to 12/10, from 2:00-3:00pm ET. Thank you for your patience and understanding.

    The Boston Marathon bombings in April 2013 put a spotlight on the stunning advances made in video surveillance and forensics technology and its use in law enforcement and security. The latest generation of video analytic tools and techniques makes it possible to extract valuable information with unprecedented speed and precision. In this webcast, Grant Fredericks, a pioneer in forensic video analysis applications, will provide expert insight into the world of video surveillance and forensics technology.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.