cybersecurity
 
  • SAIC debuts tiered cybersecurity solution

    SAIC debuts tiered cybersecurity solution

    The company's data CyberSecurity Edge ensures customers' systems and information are protected from cyber risks across multiple platforms.

  • Cubes floating in space

    The growing security threat to virtual systems

    Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.

  • Drupal-based defense-in-depth strategy protects data

    Drupal-based defense-in-depth strategy protects data

    With open-source Drupal as the foundation of a defense-in-depth strategy, agency IT managers can analyze and identify potential threat vectors, including internal and external threats.

  • Researchers work to harden cyber infrastructure from WMD

    Researchers work to harden cyber infrastructure from WMD

    The University of New Mexico will conduct field tests of recovery solutions for cyber-infrastructure backbone attacks from weapons of mass destruction and other real-world threats.

  • Agencies struggle to document responses to cybersecurity incidents

    How good is your agency's incident response?

    A GAO study finds that as the number of cybersecurity incidents in government information systems is increasing, agencies are having a tough time fully documenting their responses to these incidents.

  • CANES tech will propel future Navy networks afloat

    The Navy’s Consolidated Afloat Networks and Enterprise Services project will standardize and consolidate systems the Navy’s afloat network.

  • DISA approves AWS for more sensitive workloads

    The Defense Information Systems Agency authorized Amazon Web Services as the first commercial cloud approved at “security impact levels” 3-5 for highly sensitive workloads.

  • Personal Identity Verification card

    Happy birthday HSPD-12; there’s still a long way to go

    The presidential directive mandating interoperable smart government ID cards is 10 years old this month, and represents an impressive effort to specify and implement the technology. Now we need to put it to use.

  • 7 tactics for a smooth cloud migration

    7 tactics for a smooth cloud migration

    Before making the jump to the cloud, IT managers need to lay the groundwork, ensuring the right technology and security protocols are in place as well as a complete understanding of the regulatory issues affecting the project.

  • Incident response requires forensics and storage

    Incident response requires forensics and storage

    The growing window between compromise and discovery on networks puts a premium on forensics, and this requires effective storage of large volumes of data.

  • Stalking the insider threat

    Agencies stalk the insider threat

    Security, both physical and cyber, traditionally has been outward facing; but in the era of cyberwarfare, new tools are under development against a threat no one can afford to ignore.

  • Mobile assimilation picks up speed

    Mobile assimilation picks up speed

    As security challenges are addressed, the mobile conversation is moving from technology acquisition and introduction to assimilation into agencies' missions.

  • Man using Samsung phone in raid

    Will Knox tip government buyers toward Android?

    Samsung’s Knox containerization technology, together with sophisticated vetting in defense and security circles, is gaining traction in federal, state and local markets.

  • NYC to roll out municipal ID

    NYC to roll out municipal ID

    The ID card will be targeted to those who do not have a driver's license or other official identification and would allow New Yorkers, regardless of citizenship status, to access basic city services, open bank accounts and lease apartments.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group