DARPA to pursue new privacy tools

DARPA to pursue 'revolutionary' privacy tools

DARPA’s Brandeis project aims to develop tools with “revolutionary” impact that could help bridge privacy gaps that hamper collaboration and technology development.

HP’s security software as a service gets FedRAMP OK

With the authorization of HP’s Fortify on Demand service, federal agencies have on-demand access to continuous monitoring and vulnerability detection without additional software.

To fight insider threats, AF team models network protection layers

To fight insider threats, AF team models network protection layers

A team of researchers at the Hanscom Air Force Base has developed a process for delivering solutions that protect against insider threats.

Dell updates cloud tool with security analytics, social ID

Dell updates cloud tool with security analytics, social ID

Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.

5 tools for improved identity management

5 tools for improved identity management

While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.

Senate, DSS eyeing threat scanning systems

Senate, DSS eyeing threat scanning systems

The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.

Best sources of actionable threat intelligence

Best sources of actionable threat intelligence

Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.

Agencies navigate the identity-based security ecosystem

Agencies navigate the identity-based security ecosystem

Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.

FAA leaves air traffic system open to security risk, says GAO

FAA leaves air traffic system open to security risk, says GAO

The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.

Array Networks introduces FIPS-compliant gateway

Array Networks introduces FIPS-compliant gateway

The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.

How to keep legacy systems from becoming liabilities

How to keep legacy systems from becoming liabilities

A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.

DOD takes ISIL fight to the deep web

DOD takes ISIL fight to the deep web

DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.