Feds to take payments from digital wallets

Digital wallet services give customers options to initiate transactions via the Internet or mobile apps without the need to enroll in a system or provide personal information.

Software freezes devices that fall offline

Software freezes devices that fall offline

Absolute Software Corp.’s Device Freeze Offline Policy lets IT managers set an automated freeze command for any device that remains offline for a specified period of time.

Tech in the crossfire of DHS funding debate

Tech in the crossfire of DHS funding debate

Officials at the Department of Homeland Security have been warning of the consequences to technology programs in the event of a DHS shutdown.

Box adds user-managed encryption keys to enterprise cloud service

Box adds user-managed encryption keys to enterprise cloud

The Box Enterprise Key Management is cloud-enabled content management and collaboration system that gives enterprises full control over encryption keys, while preserving Box user experience.

Tech that helps flag fraudulent tax returns

Tech that helps flag fraudulent tax returns

Because tax fraud is pervasive, governments enlist identity verification technology to ensure refunds go to the correct taxpayer.

DOD goes beyond FedRAMP for cloud security

DOD goes beyond FedRAMP for cloud security

The Defense Department released an updated cloud security requirements guide that outlines controls and additional requirements necessary for using cloud-based solutions within DOD.

Sea change at NIST aims to ease agencies’ tech adoption

Sea change at NIST aims to ease agencies’ tech adoption

Recent modifications to IT standards confirm a changing approach to security, interoperability, and performance metrics by the National Institute of Standards and Technology.

VA wants SIEM as a service

VA wants SIEM as a service

The Veterans Affairs Department is gathering information on acquiring a security incident event management service to help it manage the entire VA cybersecurity enterprise.

Cybersecurity gets big boost in 2016 budget

Cybersecurity gets big boost in 2016 budget

The president's 2016 budget calls for$14 billion in cybersecurity spending, about a 10 percent increase over 2015 funding.

4 tips for CDM Phase 2 assessments

CDM Phase 2: How to avoid déjà vu all over again

As agencies prepare to take up the Phase 2 of DHS’s Continuous Diagnostics and Mitigation program, they would do well to replay its initial gap assessment to get the program right.

Army Research Lab posts dshell code to github

Army ‘commits’ to open source with net forensic tool

The Army Research Lab recently posted code for Dshell, its forensic network analysis tool, to GitHub to support the forensic and incident response community.

Cheat sheet for the Internet of Things

Buckle up because the Internet of Things is about to take off fast. Here's a quick list of the basics of the new super network.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.