Businessmen having a private conversation in a tunnel

How to secure mobile comm? Cut out the trusted third party.

The Silent Circle crypto service could solve BYOD security through peer-to-peer encryption, and although that could keep authorities from snooping on calls, military and intelligence agencies are getting on board.

Complex maze with cloud in background

The enemy of risk management starts with a C (and it's not China)

Complexity is the enemy of security, says NIST's FISMA lead Ron Ross, and the cloud can help simplify networks.

Business people meeting against a backdrop of financial pricing data

Financial ISAC shows how info sharing beefs up security

The Financial Services Information Sharing and Analysis Center, a collaborative effort on the cyber defense of the financial sector, was honored with the RSA Conference's information security award.

Pentagon and Washington DC covered in snow

BYO3: The tools of telework expand with the mobile workforce

Telework Week gets tens of thousands of feds to try working from home, and they're not all using an agency-issued laptop.

Computer generated image of sentry guarding a digital tunnel

Attacks hit, but don't break, new SHA-3 candidate

Research describing a more successful attack on the new Secure Hash Algorithm will be published later this month, but SHA-3 remains much more powerful than the best attacks yet discovered.

DiskVault FIPS external USB and module bay Self Encrypting Drive

CMS locks down DiskVault drives with FIPS-level encryption

The company has added NIST-certified encryption to its USB and module bay self-encrypting drives.

Old chain link fence with big hole cut in it

Why do so many antivirus programs miss the same, old exploits?

Testing by NSS Labs shows that not only do antivirus products miss known exploits, they often are blind to the same ones, opening windows of opportunity for attackers -- particularly against legacy agency systems.

Representation of a secure chip

At age 10, Trusted Computing Group sees a new world of threats

The group has brought the Trusted Platform Module in line with government requirements, but security standards must keep pace with mobile computing and rapidly changing threat environments.

RSA show floor

What rocks at RSA? Big data security, active defense.

The explosive growth in information generated by security tools is putting a premium on the ability to analyze large volumes of data, say experts, who also call for active defense.

Unlocked Census data

Census tech transition leaves security weaknesses, GAO says

An incomplete transition to a new IT security framework has left weaknesses in some systems holding sensitive census information, according to a GAO report.

Neutering iPads to make them safe in secure environments

How to make iPads safe for government? 'Neuter' them.

Mobile devices can be a risk to secure environments. A CACI exec says one approach to security has been to alter the hardware of Apple iPads.

Electronic identity verification

NSTIC opens next round of grants for secure ID technology

Project would use public-private partnerships to create easier, more secure authentication that would support online government services and commercial transactions.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering