Presidents desk

5 tech priorities for the new administration

Here are five technologies the new administration should keep on the presidential blotter.


Agencies join effort to promote use of critical controls for cybersecurity

An international organization is being formed with members including the DOD, DHS and NSA to coordinate the development of critical controls for cybersecurity and promote their use by government and industry.

Biometric fingerprint

Are your biometrics up to snuff? Free suite tests for compliance

NIST's software test suite helps to assure that biometric applications conform to NIST standards for the exchange of biometric data.

Global network

In cyber's 'pre-9-11 moment,' intell agencies turn to automation

In the face of tight technology budgets, the intelligence community will focus on cyber security, research and workforce development, said Stephanie O'Sullivan of ODNI.

Continuous monitoring

Proactive, continuous monitoring key to thwarting cyber crime

Cyber warfare is here and if we don't shift the way we think and strengthen our defenses, we will pay the price down the line, writes Jim Flyzik.

High Orbit Ion Canon

Hackers' new super weapon adds firepower to DDOS

The High Orbit Ion Canon, easy enough for a user of any skill level, unleashes powerful DDOS attacks that can be hard to detect and stop.

Secure login

The 25 worst passwords of 2012, and easy ways to avoid them

The most common passwords are also the most obvious, which makes them the easiest to crack, according to SplashData's annual list. It doesn't have to be that way.

Metasploit screen shot

How zero-day exploits can improve security

The Metasploit Framework can be used for good or ill, but its purpose is to give the good guys the same tools the bad guys are already using.

DIA Multi Domain Dissemination System

DIA message system slashes clearance-level red tape

Two-stage DIA protocol preps documents to move at 'moment's notice' across separate security domains.

ICS industrial control system

Kaspersky Labs plans industrial control OS to fend off Stuxnet-like malware

A secure, bare-bones operating system designed strictly for industrial systems could protect critical infrastructure, the founder of the Russian company says.

bank cyber security

Hackers fleece a city account as cyberattacks focus on banks

The theft of $400,000 from a Burlington, Wash., account handling employee payroll and some citizen payments comes on the heels of warnings that U.S. banks were being targeted.

Maryland online voter registration

Report: 2 states' online registration systems vulnerable to hackers, fraud

Flaws in the voter databases in Mayland and Washington state would allow hackers to effectively prevent people from voting, the New York Times reports.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.