People viewing MI Bridges portal

State pilots test ID management for online services

Michigan and Pennsylvania are testing identity proofing and enabling federated use of secure credentials for online access to government services.

Windows XP keyboard

Better late than never: 5 steps to mitigating XP risks

Even without Microsoft support, agencies can mitigate (but not eliminate) security risks to lingering XP users.

Transportation Security Operations Center

Infrastructure maintenance takes largest piece of DHS IT spending pie

Much of the focus at the Department of Homeland Security has been on improving data sharing among agencies, according to IDC Government Insights.

social media security threats

Agencies can get relief from social-launched attacks

Analytics software identifies threats to agencies from hackers who use social media sites to launch attacks.

Clouds over Washington DC

Microsoft preps its government cloud

Microsoft aims to make its government-centric cloud as close to the commercial version of Azure as possible, while offering security assurances such as the FedRAMP seal of approval.

distrustful business partners

When everybody lies: Voice-stress analysis tackles lie detection

Voice-stress analysis can help agencies assess a variety of human risk factors. But so far no technology is 100 percent accurate or foolproof.

securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

digital surveillance

System to continuously scan behavior of cleared workers

U.S. intelligence agencies are planning to thwart insider threats with a system for automated, continuous monitoring of the background and behavior of government workers with secret clearances.

Isolate XP computers from the network

Microsoft ends support for XP next month. Are you ready?

As Microsoft ends support of Windows XP in April, here are steps to prepare for transitioning to a new OS.

domino

Is the cloud the next stop for enterprise risk management?

Cloud-based governance, risk and compliance solutions are a logical step for agencies that need to address new rules, consolidate systems and serve their mobile workforce.

biometrics

DOD mulls future of troubled automated biometric ID system

The upgrade path of the Defense Department’s Automated Biometrics Identification system remains unclear as the Army confronts test failures and future IT roadblocks.

encryption

Microsoft offers email encryption from the desktop

Office 365 Message Encryption lets IT managers set the conditions for message encryption.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.