Suite lets administrators manage rules and encryption profiles of notebooks and smart phones from a single console.
Cryptography is only as secure as the keys used to encrypt and decrypt data. NIST shows agencies how to make them strong.
Continuous monitoring of IT systems can help maintain and improve security, but it is not necessarily easy to do. The National Institute of Standards and Technology has published guidance to help with the job.
Software encryption of laptop hard drives containing sensitive information certainly raises the bar on security, but for hackers, it's just one more password to crack.
Continuous monitoring of IT systems is changing the way agencies approach federal security regs, but it can only be effective on fundamentally sound systems, say government security pros.
A House panel is worried about the intrusion of Chinese manufacturers into the U.S. telecom market, but despite growing concerns over the security of the nation's IT supply chain, remedies remain difficult to find.
The ability to automatically anticipate, respond to and isolate damage to the Smart Grid could mitigate the impact of power outages.
The spread of counterfeit or tampered-with technology could force agencies to take formal steps to ensure a product's integrity.
Plans to develop automated systems for cybersecurity will build on models like DOE's Smart Grid and FAA's Next Generation air traffic control system.
Government researchers are using the human immune system as a model for building a cybersecurity ecosystem, whose features would include automation, interoperability and authentication technologies.
Hacker forums are an incubator of future cyber criminals, according to a recent Imperva report, but government is expanding educational tools of its own by sponsoring university cyber training programs and beefing up cyber force development.
A multiagency group hopes to create a cyber ecosystem that could learn to automatically assess and respond to threats. Where would humans fit in the loop?