FirstNet needs cyber safeguards

Public-safety answering points and other 911 service providers need cybersecurity professionals and continuity plans in case of cyber disasters.

How agencies can tighten personnel security

How agencies can tighten personnel security

With integrated electronic systems, agencies can better control their personnel security.

How the Identity of Things will streamline the citizen experience

How the Identity of Things will streamline the citizen experience

The Identity of Things creates a single, consistent, panoramic view of a citizen across every department in an organization, reducing the time to roll out new services from years to weeks.

Tech giants dabble in digital currency

Tech giants, Federal Reserve eye digital currency

According to recent reports IBM and Intel – and possibly the Federal Reserve – are considering using the blockchain technology associated with bitcoin to create a new digital payments system.

IARPA preps insider threat monitoring projects

IARPA preps insider threat monitoring projects

The intelligence community will brief firms on its plans for new insider threat detection and monitoring systems.

Next BlackBerry tablet is aimed at government

Next BlackBerry tablet is aimed at government

BlackBerry announced the SecuTablet, a new secure tablet outfitted with technology components from Samsung, IBM and Secusmart, a German encryption company acquired by BlackBerry last year.

Secure drone software inhibits hackers

Secure drone software evades hackers

Tech company Galois has developed a secure software solution that makes drones invulnerable to buffer overflow attacks, network sniffing, replay attacks and authentication attacks.

3 ways to combat threats from ‘device creep’

3 ways to combat threats from ‘device creep’

Government network managers do not need removable storage tools; secure managed file transfer systems can get the job done with less risk.

DARPA to pursue new privacy tools

DARPA to pursue 'revolutionary' privacy tools

DARPA’s Brandeis project aims to develop tools with “revolutionary” impact that could help bridge privacy gaps that hamper collaboration and technology development.

HP’s security software as a service gets FedRAMP OK

With the authorization of HP’s Fortify on Demand service, federal agencies have on-demand access to continuous monitoring and vulnerability detection without additional software.

To fight insider threats, AF team models network protection layers

To fight insider threats, AF team models network protection layers

A team of researchers at the Hanscom Air Force Base has developed a process for delivering solutions that protect against insider threats.

Dell updates cloud tool with security analytics, social ID

Dell updates cloud tool with security analytics, social ID

Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.