Phishing schemes mimic OPM breach notifications

Phishing schemes mimic OPM breach notifications

US-CERT warns feds to look carefully before clicking on those emails about identity-protection services.

John Hancock signature

More than patriotic: Independent e-signature technology

No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.

cybersecurity concerns SCADA cloud systems

A security checklist for SCADA systems in the cloud

Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.

Army upgrading cryptograhic equipment

Army makes headway on cryptographic equipment upgrades

The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.

weighing the pros and cons of encryption

Lessons from the ‘Crypto Wars’

A new report draws parallels to the battles over security and encryption between the government and privacy advocates in the 1990s to the current struggle in the wake of the Snowden releases.

IRS, industry to share data to fight tax fraud

IRS, industry to share data to fight tax fraud

The Internal Revenue Services has joined forces with state government and industry groups to strengthen taxpayer authentication and protect identity.

Report: Government software flawed, rarely fixed

Report: Government software flawed, rarely fixed

Most government software fails basic security screening, a new report finds. Even worse: government agencies lag far behind other sectors when it comes to fixing flaws once they're found.

NIST issues guidance for CUI in non federal systems

NIST: Protecting data after it's left your network

The National Institute of Standards and Technology published the final version of its guidance to ensure that sensitive federal information remains confidential even when stored in nonfederal systems.

NIST updates specs for next-gen PIV cards

NIST updates specs for next-gen PIV cards

New specifications add security features to verify identities and work with mobile devices.

What can your agency learn from the CDM rollout at DHS?

What can your agency learn from the CDM rollout at DHS?

Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.

DOD seeks to scrub PII from 16 years

DOD seeks to scrub PII from 16 years' worth of video

The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.

Marshals hunt down device to ID suspects in the field

Marshals hunt down device to ID suspects in the field

A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.

  • Stepping Up the Battle Against Advanced Threats

    Cyber-attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Read this whitepaper to learn where the traditional cybersecurity measures fall short and how your agency can adopt a new approach to defend against advanced threats.

  • The Rising Threat of Enterprise Cybercrime

    Cybercriminals are leveraging vulnerabilities of the Internet, browsers, operating systems, and applications to secretly and proficiently gain access to information assets. Compromising employee endpoints with malware has become the preferred method; a far simpler path into the network than a direct network attack. Agencies need to recognize and address this growing danger.