a wolf follows a scent trail to his prey

Follow malware's tracks to thwart cyber attacks

Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.

secure government websites

Government fares poorly in Web site security audit

In an annual evaluation of website security by the Online Trust Association, the most heavily trafficked .gov and .mil Web sites generally got poor marks, except for their deployment of DNSSEC.

Cybersecurity of medical devices like pacemakers

CyberRX preps health care community for cyberattack

A cybersecurity exercise by HHS and the health care community produces better security.

RFID and NFC enabled government identification

The future of government ID cards

Employee IDs cards are incorporating some relatively mature technologies that increase the level of interaction and tracking potential.

Device authentication tool helps detect tax fraudsters

Experian's Tax Return Analysis Platform goes beyond identity verification to offer device-proofing, catching fraud before refunds are processed.

Security for the Internet of things by securing systems embedded in hardware

U.C. San Diego researchers build tool to help secure IoT

A group of computer scientists at the University of California, San Diego, have developed a tool that lets designers and system builders test embedded hardware security, a first in the field.

Cybersecurity key at Department of Heath and Human Services

HHS and health care sector expand cybersecurity info sharing

The Computer Security Incident Response Center, the centerpiece of HHS's cybersecurity program, helps provide situational awareness across the enterprise and strengthens functional relationships within the health care community that it oversees to help improve security.

A Science DMZ protects research data on a high-performance network

Science DMZ: faster, more secure high-performance computing

Built near the network perimeter, a Science DMZ is a portion of the network optimized for high-performance scientific applications rather than for general-purpose business systems.

Fitness monitor wrapped around servers

Homeland Security tops FISMA scorecard. How do they do it?

The Department of Homeland Security earns top scores in FISMA compliance, thanks in part to the continuous monitoring program built by the department's Office of Inspector General.

Jigsaw puzzle with pieces named compliance and regulations

Software streamlines compliance reporting

Delphix Compliance Engine helps agencies meet changing security and compliance regulations.

digital fingerprints discovered with mobile forensics

Mobile forensics tools hammer out evidence

Proprietary and open source forensic tools are helping law enforcement extract evidence from mobile devices and even recover data that has been deleted.

Digital forensics on mobile phones

Can digital forensics keep up with smartphone tech?

Smartphones provide a wealth of evidence for forensics investigators, but the escalating number and variety of mobile devices coupled with a growing case backlog has put digital forensics development to the test.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.