Security control room at QTS Richmond data center

QTS opens secure cloud test lab for government

Facility in Richmond, Va., will speed up development and deployment of secure cloud computing services

WiebeTech Ditto Forensic FieldStation

Forensic FieldStation brings stealth to hard drive data capture

It runs silent, can turn off its lights and be operated remotely by a technician who doesn't have to join investigators or a covert team in the field.

Man installing new roof with tornado in background

New strategy for IT security: Focus on the systems, not the threats

The updated security controls in NIST SP 800-53 give administrators more flexibility and put a greater focus on IT systems with built-in security.

Data secured in the cloud

How to ensure trusted geolocation of data in the cloud

The first product of the NCCOE is a demonstration of a geolocation scheme to let end users validate that work being done in the cloud is being done in a secure location.

NIST cybersecurity building blocks

R&D center to offer 'building blocks' of cybersecurity

NIST's National Cybersecurity Center of Excellence plans to add a federally funded center to help accelerate adoption of existing cybersecurity technology.

DataGauss tabletop electronic media destruction unit

DataGauss fast way destroy hard drives

Data Device's new tabletop degaussing machine can destroy the data on a hard drive in 45 seconds.

Firefighter working a forest fire

12 steps that can help agencies fight DDOS attacks

As denial of service attacks become more frequent and powerful, agencies need to take steps to prepare, from new arrangements with ISPs to establishing low-bandwidth alternate communications.

Network adminstrator dealing with DDOS attack while city burns in background

When DDOS attacks become real threats

Servers being bombarded by requests is a nuisance, but when attacks come in conjunction with an emergency, they can lead to trouble.

Kingston DataTraveler 4000 and DataTraveler Vault Privacy secure USB flash drives

Kingston adds malware scanner to its secure drives

The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.

Attribute Based Access Control matches attributes of a person requesting access as well as attributes of the resources being requested against a policy

Is ABAC a better method for secure info sharing?

The CIO Council has identified Attribute Based Access Control as a tool for enabling information sharing across government, and NIST is developing guidelines. But it won't be easy.

AOptix iphone biometric tool

App, case turns iPhone into on-the-spot biometric scanner

The hardware and software package from AOptix would allow police and the military to take fingerprint, iris, face and voice readings in the field.

Fingerprint authentication for mobile cloud device

6 steps to secure mobile access

The IdentityX platform leverages the federal cloud and up to six ID factors to authenticate users, even those using devices not managed by the enterprise.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • All About Self-Encrypting Drives

    With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.