High-stakes poker

Cyber forecast for 2013: 4 areas where the stakes are raised

As defenses get better and the bad guys get more creative, the threats will become more complex and the risks greater in the coming year.

Identity verification

Agencies could get a cloud hub for trusted identities

The National Strategy for Trusted Identities in Cyberspace is considering commercial cloud services for authenticating third-party credentials of users accessing government websites.

People checking cellphones

Total on-the-job control of Android devices?

Software being developed by Optio Labs would control data access and app use depending on location, time of day, other apps in use and even who you’re with.

Secure keypad on digital map of world

5 programs break down the elements of an identity ecosystem

Groups will run a variety of pilots for trusted identities covering areas ranging from first-responder authentication and secure business transactions to the exchange of health care information.

Person drowning in sea

Where's the lifeboat? Cyber pros struggle in a sea of cyber threats

With threats on the rise and skills at a premium, how do cybersecurity personnel close the technology and resource gaps?

Man taking off a mask

Technologies for trusted online identities put to the test

NSTIC is funding five pilot programs that mark a major step toward creating a digital identity ecosystem to enable greater online transactions by government and the private sector.

Doctor using smart phone

HHS prescribes 11 basic steps for securing mobile devices

With an eye toward protecting patient privacy, HHS offers tools for keeping health data protected on mobile devices -- advice that any public-sector agency could follow.

Good Techology Corp. Vault iphone sleeve

Good Vault wears iPhone security on its sleeve

Good Technology's product fits over an iPhone 4 or 4s and contains a smart-card or microSD reader for two-factor authentication.

Dictionary entry for technology

NIST updates, expands glossary of security terms

A list of information security terms from federal documents is being updated by NIST to provide a central resource of common terms and definitions.

Dual authentication with one-time password

Dual passwords can keep phishers at bay

The all-too-easy hack of South Carolina's Department of Revenue could have been prevented by a dual-password system. How does it work?

Video surveillance control room

Boca Raton adds smarts to surveillance network

The Florida city is building out a city-wide digital video surveillance system and is using a management system to integrate feeds so police can get real-time views of the city.

Enterprise encryption management

SecureDoc 6.1 takes encryption to mobile devices

Suite lets administrators manage rules and encryption profiles of notebooks and smart phones from a single console.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.