hardware secured smartphone

Hardware-based mobile security market heats up

The market for hardware-rooted security for mobile devices is on the rise as anti-virus and other traditional software methods fail to meet tougher requirements from government and security-sensitive businesses.

Cirrus

NCS Technologies to debut zero-client laptop for government

The more secure laptop could also reduce costs, improve energy efficiency and ease deployment and administration.

Jefferson County

IP video surveillance puts more 'eyes' on waterway traffic

A vast traffic-monitoring network has been deployed to make sure that all can safely navigate the waters with minimal interference.

mobile security

Intrusion detection app 'trained' to spot malicious behavior

Mobile security company Zimperium releases an Intrusion Protection System app that uses artificial intelligence to recognize and block malicious behavior.

apple devices

BYOD seeds Apple's public-sector growth

The iPhone's and iPad's usability, security and closed ecosystem have made Apple devices an increasingly popular choice for public-sector IT managers.

EHR

EHR safety guides target the health IT enterprise

The SAFER Guides offer best practices on system configuration, interfaces and contingency planning for ongoing patient safety programs.

facial recognition

SRI rapid-fire facial scanner IDs people on the move

SRI International debuts its IOM Passport SL system, a facial scanner for fast identification of people on the move, in high traffic areas.

identity  theft

Indiana combats tax refund fraud with ID verification

The state's Department of Revenue plans to combat tax refund fraud with a new identity management system slated to debut this month.

security

Juniper Firefly offers a suite of virtualized security tools

The Firefly suite gives organizations a way to deliver benefits of cloud and virtualization technologies without undermining security.

clean

Automation, closed loop tactics boost enterprise security

Enhancements to Palo Alto Networks' enterprise security and threat analysis systems speed up the discovery and elimination of malware, zero-day exploits and advanced persistent threats.

Samsung

Samsung enhances self-encrypting drive for enterprise work

The new security features are designed to meet requirements for enterprise applications.

share

Civilian agencies can tap cross-domain info sharing tools

Tried and true technologies allow users with special network access to share information securely in real time.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Establishing a Logical Perimeter: The Evolution of Network Security

    This whitepaper highlights the challenges you face when users are off network, and strategies to address the compliance and protection issues posed by remote network users.

  • Zero Trust Approach to Network Security

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. Read this whitepaper to learn about the effectiveness of a Zero Trust security model in addressing the shortcomings of failing perimeter-centric strategies.

  • Stalking the Kill Chain

    Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field