What keeps federal CISOs awake at night

What keeps federal CISOs awake at night

Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.

The insider threat in employees’ pockets

The insider threat in employees’ pockets

Five experts offer advice on managing risks when agency employees bring their own mobile devices to work

DOD Enterprise Classified Travel Kit Gateways

DISA comm kits offer secure mobile access

Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.

Microsoft says start practicing now for Windows 10 update cycle

Microsoft says start practicing now for Windows 10 update cycle

IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.

black cloud software defined perimeter

‘Black Cloud’ darkens the enterprise to all but authorized devices

An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.

IoT: Is tech the easy part?

Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.

The hidden costs of “low-cost” surveillance cameras

The hidden costs of “low-cost” surveillance cameras

An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.

Beyond compliance: DISA STIGs’ role in cybersecurity

Beyond compliance: DISA STIGs’ role in cybersecurity

Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.

Hiring cybersecurity staff is hard for states

Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.

FBI seeks cyber threat info-sharing platform

FBI seeks cyber threat info-sharing platform

The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.

Army Training Network now accessible without a CAC card

Army Training Network goes mobile -- no CAC required

Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

What 700 TB of cyber threat data can do for you

IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.