To fight insider threats, AF team models network protection layers

To fight insider threats, AF team models network protection layers

A team of researchers at the Hanscom Air Force Base has developed a process for delivering solutions that protect against insider threats.

Dell updates cloud tool with security analytics, social ID

Dell updates cloud tool with security analytics, social ID

Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.

5 tools for improved identity management

5 tools for improved identity management

While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.

Senate, DSS eyeing threat scanning systems

Senate, DSS eyeing threat scanning systems

The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.

Best sources of actionable threat intelligence

Best sources of actionable threat intelligence

Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.

Agencies navigate the identity-based security ecosystem

Agencies navigate the identity-based security ecosystem

Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.

FAA leaves air traffic system open to security risk, says GAO

FAA leaves air traffic system open to security risk, says GAO

The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.

Array Networks introduces FIPS-compliant gateway

Array Networks introduces FIPS-compliant gateway

The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.

How to keep legacy systems from becoming liabilities

How to keep legacy systems from becoming liabilities

A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.

DOD takes ISIL fight to the deep web

DOD takes ISIL fight to the deep web

DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.

Unknown clouds in the government enterprise

Unknown clouds in the government enterprise

A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.

Postal Service IG wants more analytics muscle

Postal Service IG wants more analytics muscle

U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.


More from 1105 Public Sector Media Group