secure laptop

After theft, NASA orders laptops encrypted, but is that enough?

Software encryption of laptop hard drives containing sensitive information certainly raises the bar on security, but for hackers, it's just one more password to crack.

Missing puzzle piece

Continuous monitoring: A piece of the IT security puzzle

Continuous monitoring of IT systems is changing the way agencies approach federal security regs, but it can only be effective on fundamentally sound systems, say government security pros.

Semiconductor manufacturing

Supply chain threats 'hard to detect, expensive to fix'

A House panel is worried about the intrusion of Chinese manufacturers into the U.S. telecom market, but despite growing concerns over the security of the nation's IT supply chain, remedies remain difficult to find.

Inspecting microchip

Fake tech: What can agencies do to protect themselves?

The spread of counterfeit or tampered-with technology could force agencies to take formal steps to ensure a product's integrity.

Down power lines

7 elements of a self healing power grid

The ability to automatically anticipate, respond to and isolate damage to the Smart Grid could mitigate the impact of power outages.

FAA NextGen

Agency programs show outlines of future cyber ecosystem

Plans to develop automated systems for cybersecurity will build on models like DOE's Smart Grid and FAA's Next Generation air traffic control system.

Human network

How to build an immune system for cybersecurity attacks

Government researchers are using the human immune system as a model for building a cybersecurity ecosystem, whose features would include automation, interoperability and authentication technologies.

Cybersecurity training

As hacker forums breed recruits, government stages cyber education counterattack

Hacker forums are an incubator of future cyber criminals, according to a recent Imperva report, but government is expanding educational tools of its own by sponsoring university cyber training programs and beefing up cyber force development.


Could a cyber ecosystem automatically defend government networks?

A multiagency group hopes to create a cyber ecosystem that could learn to automatically assess and respond to threats. Where would humans fit in the loop?

Texting on phones

NIST spells out baseline security requirements for next-gen mobile devices

Mobile devices lack the hardware-based security needed to make them trusted tools in the workplace; a draft NIST publication identifies the requirements for making them secure enterprise devices.

Presidents desk

5 tech priorities for the new administration

Here are five technologies the new administration should keep on the presidential blotter.


Agencies join effort to promote use of critical controls for cybersecurity

An international organization is being formed with members including the DOD, DHS and NSA to coordinate the development of critical controls for cybersecurity and promote their use by government and industry.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.

  • Zero Trust Approach to Network Security

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. Read this whitepaper to learn about the effectiveness of a Zero Trust security model in addressing the shortcomings of failing perimeter-centric strategies.

  • Stalking the Kill Chain

    Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field