Windows XP keyboard

Better late than never: 5 steps to mitigating XP risks

Even without Microsoft support, agencies can mitigate (but not eliminate) security risks to lingering XP users.

Transportation Security Operations Center

Infrastructure maintenance takes largest piece of DHS IT spending pie

Much of the focus at the Department of Homeland Security has been on improving data sharing among agencies, according to IDC Government Insights.

social media security threats

Agencies can get relief from social-launched attacks

Analytics software identifies threats to agencies from hackers who use social media sites to launch attacks.

Clouds over Washington DC

Microsoft preps its government cloud

Microsoft aims to make its government-centric cloud as close to the commercial version of Azure as possible, while offering security assurances such as the FedRAMP seal of approval.

distrustful business partners

When everybody lies: Voice-stress analysis tackles lie detection

Voice-stress analysis can help agencies assess a variety of human risk factors. But so far no technology is 100 percent accurate or foolproof.

securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

digital surveillance

System to continuously scan behavior of cleared workers

U.S. intelligence agencies are planning to thwart insider threats with a system for automated, continuous monitoring of the background and behavior of government workers with secret clearances.

Isolate XP computers from the network

Microsoft ends support for XP next month. Are you ready?

As Microsoft ends support of Windows XP in April, here are steps to prepare for transitioning to a new OS.

domino

Is the cloud the next stop for enterprise risk management?

Cloud-based governance, risk and compliance solutions are a logical step for agencies that need to address new rules, consolidate systems and serve their mobile workforce.

biometrics

DOD mulls future of troubled automated biometric ID system

The upgrade path of the Defense Department’s Automated Biometrics Identification system remains unclear as the Army confronts test failures and future IT roadblocks.

encryption

Microsoft offers email encryption from the desktop

Office 365 Message Encryption lets IT managers set the conditions for message encryption.

cybersecurity

NSA, universities push to establish cybersecurity as a science

The National Security Agency is sponsoring a competition for the best paper on cybersecurity, part of an effort to promote the practice as a science.

Topic Resources

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.

  • Continuous Monitoring to Achieve Cybersecurity

    As the cyber threat landscape evolves, security methods and tools need to change, too. In this Digital Dialogue, Ken Durbin, manager of Continuous Monitoring Practice at Symantec, explains how the undefined boundaries of the modern IT infrastructure necessitate the deployment of continuous monitoring solutions.

  • Stopping Zero-Day Exploits for Dummies

    Cyber attacks are growing every day and can become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you will discover the zero-day exploits and threats used to compromise your agency.