cybersecurity
 
  • 2015 mobility mantra: manage data, not devices

    2015 mobility mantra: manage data, not devices

    Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.

  • relevance of antivirus software

    Is antivirus software still relevant?

    No matter how useful antivirus software can be, its drawbacks are causing information security professionals to take a second look at antivirus protection – and the alternatives.

  • Michigan builds identity proofing pilot program

    Michigan builds identity proofing pilot

    An automated multi-step identity authentication portal aims to cut down on fraud and waste by confirming the identity of clients at the time they are applying for benefits.

  • In 2015, a convergence of agency IT security and operations

    In 2015, agency IT security and operations converge

    The new year will see a convergence of IT security and operations, as agencies spread responsibilities across IT departments and security tools become integrated into software lifecycles earlier .

  • Police body cameras are only one piece of the video equation

    Police body cameras are only one piece of the video equation

    A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.

  • Privacy accessories for the secure and stylish

    Privacy wearables and accessories for the secure – and stylish

    After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.

  • Best practices for emergency preparedness

    'Tis the season for emergency preparedness

    Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.

  • Fujitsu launches secure enterprise tablets

    Fujitsu launches secure enterprise tablets

    Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.

  • DISA drafts new cloud security requirements

    DISA drafts new cloud security requirements

    The Defense Information Systems Agency released a draft of cloud computing security requirements for the Defense Department.

  • KEMP introduces support for Federal ID smart cards

    KEMP introduces support for federal ID smart cards

    The provider of software-centric and cloud-focused load balancer solutions now supports integration with Defense Department environments using CAC authentication and Active Directory application infrastructures.

  • Will CDM finally be ‘the realization of IT security’?

    Will CDM finally be ‘the realization of IT security’?

    Tools and services are being chosen for Phase 2 of the Continuous Diagnostics and Mitigation program, which security watchers say could be a revolutionary step in how the government protects its information.

  • Apps, not malware, should be your biggest MDM concern

    Apps, not malware, should be your biggest mobile concern

    A two-pronged approach to mobile security focuses on enforcing security from the center while showing users the security risks at the endpoints of their mobile devices.

  • NIST revises guidance on security, privacy assessments

    NIST revises guidance on security, privacy assessments

    The publication provides guidelines for building security and privacy assessment plans as well as procedures for assessing the effectiveness of security and privacy controls used in information systems and organizations.

  • Can BlackBerry Classic power a comeback?

    Can BlackBerry Classic power a comeback?

    BlackBerry Classic returns to the old form factor and includes BlackBerry Balance, the technology that allows personal and work data to reside in separate partitions on the device.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.