'Polymorphic' botnet draws international attention

Beebone, or AAEH, allows multiple forms of malware to compromise security on a wide range of operating systems.

What two-factor authentication could really accomplish in government

What two-factor authentication could really accomplish in government

An upgrade to a chip-and-PIN cards for Social Security, Medicare and employment verification would enhance personal privacy, secure identities and prevent fraud.

Built-in security enables cyber resilience

Built-in security enables cyber resilience

Agencies need to protect systems from software vulnerabilities that compromise availability, integrity and security.

General Dynamics

General Dynamics' high-speed encryptor now NSA certified

Providing end-to-end 10 gigbit/sec throughput speed, General Dynamics Mission Systems' TACLANE-10G secures information classified Top Secret and below over government and commercial networks.

Get ready for wearables

Get ready for wearables

Though we may be years away from significant adoption, it’s important for government agencies to begin incorporating wearables into their security planning now.

How hard is it to permanently delete data?

How hard is it to permanently delete data?

Even though Hillary Clinton deleted her email, experts can probably recover it.

Air gap vulnerabilities

Researchers show air-gapped systems susceptible to attack

Air-gapped systems, thought to be the most secure because of their isolation, have newly discovered vulnerabilities.

Internet voting not secure enough

Online voting still faces security issues

Suggestions for tech-based solutions for voting and elections may sound practical, but they are certain security hazards.

FirstNet needs cyber safeguards

Public-safety answering points and other 911 service providers need cybersecurity professionals and continuity plans in case of cyber disasters.

How agencies can tighten personnel security

How agencies can tighten personnel security

With integrated electronic systems, agencies can better control their personnel security.

How the Identity of Things will streamline the citizen experience

How the Identity of Things will streamline the citizen experience

The Identity of Things creates a single, consistent, panoramic view of a citizen across every department in an organization, reducing the time to roll out new services from years to weeks.

Tech giants dabble in digital currency

Tech giants, Federal Reserve eye digital currency

According to recent reports IBM and Intel – and possibly the Federal Reserve – are considering using the blockchain technology associated with bitcoin to create a new digital payments system.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.