Businessman on stone steps with mobile background

The 4 levels of authentication in a mobile world

The growing use of remote devices to access government resources spurs NIST to revise its guide on how to select the right authentication technology for groups of users.

Investigators looking at cellphone

Forensics tool helps police crack suspects' cell phones

Paraben's Device Seizure 6 can break passwords, track where a phone has been and map the complete file system, including deleted data.

Computer security

'Substantial' changes ahead for federal cybersecurity controls

NIST's updated catalog of security controls addresses new threats and lets agencies adapt baseline controls to meet their specific needs.

Complex gear system in cloud

Authentication with cloud, BYOD: It's complicated

The growth of IT services across the enterprise makes identifying users complex, but three government efforts aim to standardize and simplify access control.

Single sign on man handing over key

Single sign-on, trusted identities move closer to reality

As government pilots work out the details cross-platform authentication, ID systems by Google and Microsoft offer a preview of how they would work.

Network security via password

FCC improved its security after breach, but did it move too fast?

After a September 2011 data breach, FCC rushed to enhance security, but ignored security management practices and created unnecessary risks in its IT systems, GAO says.

Man using crowbar to break into house

Penetration testing: Pros and cons of attacking your own network

Pen-testing, or red-teaming, can be an indispensable tool for discovering and correcting network security weaknesses, but if not done right, things can go terribly wrong.

Mask of human head with bar code

Is there a uniform way to handle online identities?

NIST proposes a model for maintaining and revoking user identities in an increasingly complex online world.

Internet cafe in China

Attack traffic from China takes a great leap forward

Cyberattack traffic originating in China took a sharp jump in late 2012, according to the latest analysis of activity on Akamai’s global content delivery network.

Concept of identity verification people holding checkmarks in front of their faces

USPS to pilot cloud-based federal ID credential hub

The Postal Service has been tapped to build a pilot identity credential hub that would simplify secure access for citizens to online government services.

Data visualization

Know the 4 denial of service types that can threaten the Domain Name System

DNS' openness leaves it vulnerable to a variety of denial of service techniques, from brute-force floods to sophisticated recursive attacks.

Man with umbrella sheltering woman from storm

9 steps that help defend against DDOS

Most experts agree that you can't do it all by yourself, but there are practical measures agencies can take to shore up their networks against denial of service attacks.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • Video Surveillance: Emerging Solutions for Securing Agency Assets

    Please note that this webcast, originally scheduled for 10/16, from 2:00-3:00pm ET, has been rescheduled to 12/10, from 2:00-3:00pm ET. Thank you for your patience and understanding.

    The Boston Marathon bombings in April 2013 put a spotlight on the stunning advances made in video surveillance and forensics technology and its use in law enforcement and security. The latest generation of video analytic tools and techniques makes it possible to extract valuable information with unprecedented speed and precision. In this webcast, Grant Fredericks, a pioneer in forensic video analysis applications, will provide expert insight into the world of video surveillance and forensics technology.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.