Man with virtual monitors

Big data takes on the kill chain

Big data systems can correlate structured and unstructured data to paint a complete picture about an agency’s overall IT health and offer insight into the sophisticated threats.

ID management schematic

Cloud service simplifies certificate management, credentialing

Entrust IdentityGuard cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing.

IT manager heartbleed data center

Heartbleed prognosis: Long, laborious discovery, recovery

Described as "one of the scariest bugs I've seen" by a DOD technical analyst, Heartbleed could leave agency systems from enterprise email to Web sites vulnerable to attack.

Computer security combination lock on keyboard

ID resolution software helps thwart fraud rings

FICO's 50+ algorithms scour multiple data sources to help defeat criminal rings that perpetrate money laundering, insider fraud and other crimes.

Credential management

Government's credential exchange to go live soon

The Federal Cloud Credential Exchange, hosted by the Postal Service, is expected to be in operation this spring, providing a cloud-based identity hub for agencies.

People viewing MI Bridges portal

State pilots test ID management for online services

Michigan and Pennsylvania are testing identity proofing and enabling federated use of secure credentials for online access to government services.

Windows XP keyboard

Better late than never: 5 steps to mitigating XP risks

Even without Microsoft support, agencies can mitigate (but not eliminate) security risks to lingering XP users.

Transportation Security Operations Center

Infrastructure maintenance takes largest piece of DHS IT spending pie

Much of the focus at the Department of Homeland Security has been on improving data sharing among agencies, according to IDC Government Insights.

social media security threats

Agencies can get relief from social-launched attacks

Analytics software identifies threats to agencies from hackers who use social media sites to launch attacks.

Clouds over Washington DC

Microsoft preps its government cloud

Microsoft aims to make its government-centric cloud as close to the commercial version of Azure as possible, while offering security assurances such as the FedRAMP seal of approval.

distrustful business partners

When everybody lies: Voice-stress analysis tackles lie detection

Voice-stress analysis can help agencies assess a variety of human risk factors. But so far no technology is 100 percent accurate or foolproof.

securing data in use in the cloud

How to lock down data in use -- and in the cloud

The challenge of securing data in use is attracting cloud encryption solutions from industry heavyweights to cloud security startups.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • All About Self-Encrypting Drives

    With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.