How to limit cyber risk with adaptive authentication

How to limit cyber risk with adaptive authentication

After establishing a baseline level of trust, subsequent decisions regarding access should factor in the context of that decision and the value of the resource being requested.

Air Force outlines initial steps to protect embedded systems

Air Force outlines initial steps to protect embedded systems

A recent study offered 10 recommendations for bolstering cybersecurity of commonly used embedded systems.

Concerned about cyber hygiene? Steer clear of .zip domain

Concerned about cyber hygiene? Steer clear of unfamiliar domains

A new study details which Top-Level Domains are saturated with suspicious websites.

Interior signs up for Windows Server 2003 support

Interior signs up for Windows Server 2003 support

The agency's Bureau of Reclamation announced a one-year limited-source award to Microsoft reseller New Tech to support 100 licenses of Windows Server 2003.

DHS outlines biometric future

DHS outlines biometric future

The Department of Homeland Security released its vision for how enhanced biometrics capabilities will transform the agency’s operations over the next 10 years.

Iowa testing digital driver’s licenses

Iowa testing digital driver’s licenses

The state's Department of Transportation is testing mobile driver license software with employees who will assess and validate the solution.

Whose keys are they anyway?

Whose keys are they anyway?

Joining other cloud providers, Google hands customers the encryption keys. But is this the best way to keep agency data safe?

Trust and verify: Managing the cloud abroad and at home

Trust and verify: Managing the cloud abroad and at home

Trusted computing can help agencies manage geographically dispersed servers and emerging OpenStack deployments.

DARPA wants to take the sting out of DDoS attacks

DARPA wants to take the sting out of DDoS attacks

The Defense Advanced Research Projects Agency’s XD3 program is looking for innovative ways to mitigate and minimize the effects of DDoS attacks on networks.

Symantec takes on the Internet of unsecured things

Symantec takes on the Internet of unsecured things

The company’s Embedded Critical Systems Protection locks down the software embedded in the devices to protect against zero-day attacks and prevent compromise.

Iowa installs visual broadband monitoring system

Iowa installs visual broadband monitoring system

The Iowa Communications Network now has a way to visually track real-time network and information system disruptions and cyberattacks.

4 ways to shine a light on shadow IT

4 ways to shine a light on shadow IT

Automated management, monitoring and security tools – along with common-sense policies – can help agencies gain the upper hand against shadow IT.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.