Enterprise encryption management

SecureDoc 6.1 takes encryption to mobile devices

Suite lets administrators manage rules and encryption profiles of notebooks and smart phones from a single console.

Keys

The key to crypto? It's in the key

Cryptography is only as secure as the keys used to encrypt and decrypt data. NIST shows agencies how to make them strong.

Computer monitoring

Help is available for effective continuous monitoring

Continuous monitoring of IT systems can help maintain and improve security, but it is not necessarily easy to do. The National Institute of Standards and Technology has published guidance to help with the job.

secure laptop

After theft, NASA orders laptops encrypted, but is that enough?

Software encryption of laptop hard drives containing sensitive information certainly raises the bar on security, but for hackers, it's just one more password to crack.

Missing puzzle piece

Continuous monitoring: A piece of the IT security puzzle

Continuous monitoring of IT systems is changing the way agencies approach federal security regs, but it can only be effective on fundamentally sound systems, say government security pros.

Semiconductor manufacturing

Supply chain threats 'hard to detect, expensive to fix'

A House panel is worried about the intrusion of Chinese manufacturers into the U.S. telecom market, but despite growing concerns over the security of the nation's IT supply chain, remedies remain difficult to find.

Down power lines

7 elements of a self healing power grid

The ability to automatically anticipate, respond to and isolate damage to the Smart Grid could mitigate the impact of power outages.

Inspecting microchip

Fake tech: What can agencies do to protect themselves?

The spread of counterfeit or tampered-with technology could force agencies to take formal steps to ensure a product's integrity.

FAA NextGen

Agency programs show outlines of future cyber ecosystem

Plans to develop automated systems for cybersecurity will build on models like DOE's Smart Grid and FAA's Next Generation air traffic control system.

Human network

How to build an immune system for cybersecurity attacks

Government researchers are using the human immune system as a model for building a cybersecurity ecosystem, whose features would include automation, interoperability and authentication technologies.

Cybersecurity training

As hacker forums breed recruits, government stages cyber education counterattack

Hacker forums are an incubator of future cyber criminals, according to a recent Imperva report, but government is expanding educational tools of its own by sponsoring university cyber training programs and beefing up cyber force development.

Cactus

Could a cyber ecosystem automatically defend government networks?

A multiagency group hopes to create a cyber ecosystem that could learn to automatically assess and respond to threats. Where would humans fit in the loop?

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering