Army Research Lab posts dshell code to github

Army ‘commits’ to open source with net forensic tool

The Army Research Lab recently posted code for Dshell, its forensic network analysis tool, to GitHub to support the forensic and incident response community.

Cheat sheet for the Internet of Things

Buckle up because the Internet of Things is about to take off fast. Here's a quick list of the basics of the new super network.

Broader white hat community improves outcomes, research suggests

More white hats improve security, researchers demonstrate

Bug bounties can increase the breadth – and the effectiveness – of white hat communities.

Windows 10 for government

Windows 10: Secure enough for government?

Microsoft’s new as-a-service operating system will come with a number of built-in security features like multi-factor authentication and containerization.

GAO: Agencies face cyber risk in building access systems

GAO: Agencies face cyber risk in building access systems

The Department of Homeland Security and the General Services Administration come up short in tackling cyber risk of access control systems in buildings they manages across the United States.

Swimlane launches automated security operations management platform

Swimlane launches automated security operations platform

With its data-driven automation and orchestration, Swimlane manages alerts, increases situational awareness and remediates threats.

DNI offers roadmap for national security data sharing

Agencies get roadmap for security data sharing

The Office of the Director of National Intelligence’s Information Sharing Environment released best practices for data sharing in pursuing national security threats.

open source components not always secure

How secure are your open source-based systems?

Software developers often assume that open source components in their supply chain are reliable – but assumptions like were behind the Heartbleed exploit. Here are ways to lock down your open source projects.

Firms combine mobile dev, code analysis for agency apps

Mobile dev, code analysis tool debuts for DOD, intell agencies

CACI, Appcelerator join forces in developing a tool to help agencies develop and release secure apps on schedule and within budget.

Focus on security obscures rise of ‘shadow IT’

Focus on security obscures rise of ‘shadow IT’

The Cloud Security Alliance survey finds more employees are empowered to use cloud-based applications – without IT department oversight.

5 trends that will drive IT management in 2015

5 trends that will drive IT management in 2015

2015 is shaping up as a year when data analytics, ubiquitous video, and cyber forensics will force government IT managers to make decisions about how they deploy their resources.

2015 mobility mantra: manage data, not devices

2015 mobility mantra: manage data, not devices

Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group