Software automates DISA STIG audits

Portable software automates DISA STIG audits

SecureVue Auditor License offers a portable software solution for Defense Department IT network audits.

DOD approves derived credentials on BlackBerrys

DOD approves derived credentials on BlackBerrys

The Department of Defense has recently approved derived public key infrastructure credentials on BlackBerry devices.

Firm builds Adversary Pursuit Center for remote cyber services

Firm builds Adversary Pursuit Center for remote cyber services

root9B will open a $2 million cybersecurity center to provide remote security services to the company’s government and commercial clients.

mitigate the damage from DDoS attacks

How to minimize the impact from DDoS attacks

While government agencies will always be targets of distributed denial-of-service attacks, they can make themselves less appealing to hackers.

IT security spending priorities don’t match threats

IT security spending priorities don’t match threats

A survey of Black Hat 2015 attendees reveals a disparity between “the threats that keep security professionals awake at night and the tasks that keep them occupied during the day.”

CBP tests handheld biometric devices to collect exit data

CBP tests handheld biometric devices to collect exit data

Customs and Border Protection will collect fingerprints and passport information and compare it to the same data that was collected when the traveler arrived in the United States.

How to avoid becoming the next OPM

How to avoid becoming the next OPM

Platform analytics can provide state and local governments with both proactive detection and defensive threat mitigation -- and the information learned can be shared across departments.

data loss prevention

Preventing data breaches from becoming data disasters

Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.

What the U.K. Government Digital Service learned about permissions

What the U.K. Government Digital Service learned about permissions

Lessons from a digital-government pioneer on how to think about providing better citizen service.

A 5-point plan for cyber fitness

A 5-point plan for cyber fitness

An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.

NJ partnership fights financial cyber threats

NJ partnership fights financial cyber threats

The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.

States crack down on driver

States crack down on driver's license fraud

States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.