Managers concerned about IT budgets, cybersecurity

IT managers: The biggest threat to infrastructure isn't cyber

Reducing costs, improving security, boosting efficiency are the top priorities for federal, state and local agencies, according to a Cisco survey.

network

Updated platform rescues DHS info sharing network

The Homeland Security Information Network was in danger of cancellation until refocused project management enabled the launch of a more secure platform for sharing sensitive information across federal, state and local agencies, as well as the private sector.

Father and daughter loggin onto computer site

With remote logon, DOD families get single-password access to military websites

The Defense Department's Self-Service Logon system met a growing need for authenticated access to defense websites by service members and their families unable to use the Common Access Card.

cyber competition

Air Force cadets earning honors as academic hackers

An Air Force Academy team has won a finalist spot in an international cybersecurity contest for the third year in a row, continuing a record of success in hacking competitions.

cloud

USPS' federal ID exchange will run on HP Enterprise Cloud

The FedRAMP-authorized platform was selected by SecureKey Technologies to provide cloud services for the authentication infrastructure.

security

Next steps in security automation

Building on the government's Security Content Automation Protocol, a working group is developing a set of international standards for automating the job of assessing and monitoring the security of IT systems.

Dashboard gauge indicating near compliance

Agencies still struggling with FISMA compliance

The latest GAO report on IT security shows "mixed progress" in implementing required security programs, citing inadequate reporting metrics and a focus on regulatory compliance as the culprits.

Hacker in a dark room

Hackers-for-hire group targeting government assets, report says

Hidden Lynx, a sophisticated group of professional hackers located in China, has carried out high-profile attacks on government, IT contractors and other industries at least since 2009, Symantec says.

stealth

Stealth can protect networks by making parts invisible

Unisys has high hopes for government uses of the software tool that controls who sees what on a network.

DNS

NIST updates guidelines for securing the DNS

NIST updated its guidance for deploying a secure Domain Name System in government enterprises to ensure the availability and integrity of critical DNS data.

LynxWorks rootkit detection

LynuxWorks rootkit detector adds hardware punch to security scanning

LynuxWorks' system, called RDS5201, is an appliance capable of detecting low-level, zero-day rootkits in real time.

ID

5 pilots to take trusted online ID plan to the next stage

The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Big Data Integration and Analytics for Cyber Security

    Conventional methods for mitigating cyber-attacks are no longer sufficient. Big data analytics — along with an advanced, more strategic approach to network security — is needed to disrupt adversary tools and techniques, and render them ineffective.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.