securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

digital surveillance

System to continuously scan behavior of cleared workers

U.S. intelligence agencies are planning to thwart insider threats with a system for automated, continuous monitoring of the background and behavior of government workers with secret clearances.

Isolate XP computers from the network

Microsoft ends support for XP next month. Are you ready?

As Microsoft ends support of Windows XP in April, here are steps to prepare for transitioning to a new OS.

domino

Is the cloud the next stop for enterprise risk management?

Cloud-based governance, risk and compliance solutions are a logical step for agencies that need to address new rules, consolidate systems and serve their mobile workforce.

biometrics

DOD mulls future of troubled automated biometric ID system

The upgrade path of the Defense Department’s Automated Biometrics Identification system remains unclear as the Army confronts test failures and future IT roadblocks.

encryption

Microsoft offers email encryption from the desktop

Office 365 Message Encryption lets IT managers set the conditions for message encryption.

cybersecurity

NSA, universities push to establish cybersecurity as a science

The National Security Agency is sponsoring a competition for the best paper on cybersecurity, part of an effort to promote the practice as a science.

Continuous monitoring

5 elements of a successful CMaaS program

A continuous monitoring-as-a-service approach gives agencies access to the services necessary to design, implement and maintain a monitoring program.

smartphone ID

Can derived credentials turn a phone into an ID manager?

The federal government has been testing derived credentials for smartphone-based remote authentication, but making the plan work is proving to be tricky.

monitor

Got your security monitoring game in gear?

Requirements from OMB for Information Security Continuous Monitoring set a Feb. 28 deadline for agencies to prepare formal plans that include a transition to standardized technology and automated feeds to a yet-to-be-developed government dashboard.

encryption

A single console for managing full disk encryption headaches

The latest release of Sophos SafeGuard Encryption adds central management of full disk encryption built into Windows and Apple operating systems to its toolkit.

intellsharing

Social platform for sharing cyberthreat intell goes live

IID's ActiveTrust threat sharing platform combines social networking with binding contracts to create a secure environment in which agencies and enterprises feel comfortable sharing information about cyberthreats.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.