Hiring cybersecurity staff is hard for states

Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.

FBI seeks cyber threat info-sharing platform

FBI seeks cyber threat info-sharing platform

The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.

Army Training Network now accessible without a CAC card

Army Training Network goes mobile -- no CAC required

Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

What 700 TB of cyber threat data can do for you

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers

More evidence that employee negligence is security risk No. 1

Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.

Shutterstock image (by Rawpixel): Data file folder background.

Cyber tools that maximize ROI (maybe)

Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.

Bodyprint uses ear scans for authentication

Unlock your phone with your ear

Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.

Plan for the next breach with incident response forensics

In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.

holistic security

Adopting a holistic approach to FISMA compliance

By examining the entire IT infrastructure, security teams can determine how best to assign controls and centralize tasks.

Watch out:  Smart city defenses are not up to snuff

Watch out: Smart city defenses are not up to snuff

A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.

cyber cloud certification

New cloud security certification debuts

Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.

Cyber risks inherent in NextGen transition, GAO warns

Cyber risks inherent in NextGen transition, GAO warns

The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.