secure cloud

Is FedRAMP working? It better.

It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.

shared services

Lack of awareness slows cloud shared services, providers say

In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.

Belkin DisplayPort Secure KVM

Secure KVM switch a good fit for government

Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.

social media

How agencies can take social media through the FISMA process

Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.

Training for those with cybersecurity responsibilities

Training the cyber workforce to handle new threats

Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.

top 10

Users offer 10 security tips to IT staff

A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.

Businessman examining code

NSA's reported tampering could change how crypto standards are made

NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.

Encrypted email

Alliance aims to develop spy-proof email

Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.

keystroke

Keystroke encryption coming for Apple, Android phones

GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.

phishing

Internet Explorer leads in tests against social engineering threats

Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.

audio

5 ways to protect audio and microphones from malicious exploits

Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.

hacker

Military, NASA other agencies hit in series of attacks

A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.

Topic Resources

  • Advanced Threats and Big Data: The New Cybersecurity Landscape

    So often in our organizations, information silos keep us from sharing data and communicating the right information at the right time to stop advanced threats. Hear why a big data solution is an important part of a defense against advanced threats and ideas about what data sources are required across the organization for this analysis to combat these attacks.

  • The STAND: Cybersecurity

    Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned about the ongoing evolution of the cyber landscape, it just means they are not paying enough attention. The problem is that these and other emerging cyber tactics are designed to evade traditional cyber defenses and escape detection until it’s too late. The good news is it’s not a lost cause. In this special report, two subject matter experts discuss cybersecurity technologies and strategies that can help agencies defend their systems and data against the latest cyber threats, today and into the future.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.