Firefighter working a forest fire

12 steps that can help agencies fight DDOS attacks

As denial of service attacks become more frequent and powerful, agencies need to take steps to prepare, from new arrangements with ISPs to establishing low-bandwidth alternate communications.

Network adminstrator dealing with DDOS attack while city burns in background

When DDOS attacks become real threats

Servers being bombarded by requests is a nuisance, but when attacks come in conjunction with an emergency, they can lead to trouble.

Kingston DataTraveler 4000 and DataTraveler Vault Privacy secure USB flash drives

Kingston adds malware scanner to its secure drives

The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.

Attribute Based Access Control matches attributes of a person requesting access as well as attributes of the resources being requested against a policy

Is ABAC a better method for secure info sharing?

The CIO Council has identified Attribute Based Access Control as a tool for enabling information sharing across government, and NIST is developing guidelines. But it won't be easy.

AOptix iphone biometric tool

App, case turns iPhone into on-the-spot biometric scanner

The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.

Fingerprint authentication for mobile cloud device

6 steps to secure mobile access

The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.

Blackholing stops DDOS attacks but shuts off all traffic

Blackholing stops DDOS attacks but consumes everything else too

As attacks increase in power, efficiency and duration, operators may have to use black holes to protect their networks.

DDOS acks increasing

DDOS attacks turn up the volume

Attacks from botnets are increasing in bandwidth and, significantly, packet rates, a Prolexic report says.

iPhone has most vulnerabilities but Android is the most attacked

iPhone has most vulnerabilities, so why is Android the most attacked?

Android, with only a handful of vulnerabilities reported in 2012, was the OS of choice for malware writers, Symantec says.

Image of aftermath of the Boston Marathon bombing by Vjeran Pavic via Flickr

How video analytics helps reconstruct Boston Marathon bombings

Analyzing terabytes of footage from events such as the Boston Marathon bombings is still a largely manual task, but video analytics tools can save investigators a lot of time.

Checking computer memory

Group aims to draw the line on counterfeit IT

The Open Group's standard could help government ensure that COTS products do not contain backdoors or counterfeit components.

One worker in an empty cubicle farm

6 steps to secure systems for sequester

Patches, idle accounts, mobile devices not in use and, yes, disgruntled workers have to be accounted for.

Topic Resources

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.

  • Continuous Monitoring to Achieve Cybersecurity

    As the cyber threat landscape evolves, security methods and tools need to change, too. In this Digital Dialogue, Ken Durbin, manager of Continuous Monitoring Practice at Symantec, explains how the undefined boundaries of the modern IT infrastructure necessitate the deployment of continuous monitoring solutions.

  • Stopping Zero-Day Exploits for Dummies

    Cyber attacks are growing every day and can become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you will discover the zero-day exploits and threats used to compromise your agency.