The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.
The CIO Council has identified Attribute Based Access Control as a tool for enabling information sharing across government, and NIST is developing guidelines. But it won't be easy.
The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.
The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.
As attacks increase in power, efficiency and duration, operators may have to use black holes to protect their networks.
Attacks from botnets are increasing in bandwidth and, significantly, packet rates, a Prolexic report says.
Android, with only a handful of vulnerabilities reported in 2012, was the OS of choice for malware writers, Symantec says.
Analyzing terabytes of footage from events such as the Boston Marathon bombings is still a largely manual task, but video analytics tools can save investigators a lot of time.
The Open Group's standard could help government ensure that COTS products do not contain backdoors or counterfeit components.
Patches, idle accounts, mobile devices not in use and, yes, disgruntled workers have to be accounted for.
Co3's system can help agencies identify an attack or breach, in part by putting users on the case, and then lead officials through the response.
In the face of growing use of stolen and fake certificates to deliver malicious code, NIST and an industry alliance are working to improve what has become an automated, online process.