Cyber Innovation Center at the National Cyber Research Park

New cyber programs debut in California, Louisiana

Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.

derived credentials for smartphones

How to protect data for the always connected employee

The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.

OPM data breach

OPM: 21.5 million affected by background-check breach

The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.

How US-CERT gets the word out

How US-CERT gets the word out

The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.

results of cybersecurity sprint

Nearing the finish line: What to expect from the cybersecurity sprint

Following recent cyber breaches, U.S. CIO Tony Scott ordered a cybersecurity sprint to rapidly evaluate problem areas. As that 30-day dash comes to a close, experts weigh in on the likely outcomes.

DHS expands access to virtual cybersecurity training

DHS expands access to virtual cybersecurity training

The Department of Homeland Security expands its FedVTE program, giving state, local, tribal and territorial government employees free access to cybersecurity training.

Phishing schemes mimic OPM breach notifications

Phishing schemes mimic OPM breach notifications

US-CERT warns feds to look carefully before clicking on those emails about identity-protection services.

John Hancock signature

More than patriotic: Independent e-signature technology

No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.

cybersecurity concerns SCADA cloud systems

A security checklist for SCADA systems in the cloud

Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.

Army upgrading cryptograhic equipment

Army makes headway on cryptographic equipment upgrades

The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.

weighing the pros and cons of encryption

Lessons from the ‘Crypto Wars’

A new report draws parallels to the battles over security and encryption between the government and privacy advocates in the 1990s to the current struggle in the wake of the Snowden releases.

IRS, industry to share data to fight tax fraud

IRS, industry to share data to fight tax fraud

The Internal Revenue Services has joined forces with state government and industry groups to strengthen taxpayer authentication and protect identity.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.