cybersecurity
 
  • Windows Server 2003: The end is nearer than you think

    Windows Server 2003: The end is nearer than you think

    It can take seven months or more to migrate to a new server operating system, so Microsoft's July 2015 cut-off date for Windows Server 2003 support really is just around the corner.

  • 6 ways for software developers to build security into new applications

    6 ways to build in security

    The cost and technical challenge of adding security to complex systems after the fact are prohibitive. Here are some steps developers and managers can take to build security into new software applications.

  • a wolf follows a scent trail to his prey

    Follow malware's tracks to thwart cyber attacks

    Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.

  • Stakes rising as malware matures

    Stakes rising as malware matures

    How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?

  • secure government websites

    Government fares poorly in Web site security audit

    In an annual evaluation of website security by the Online Trust Association, the most heavily trafficked .gov and .mil Web sites generally got poor marks, except for their deployment of DNSSEC.

  • Cybersecurity of medical devices like pacemakers

    CyberRX preps health care community for cyberattack

    A cybersecurity exercise by HHS and the health care community produces better security.

  • Man stares at screen

    Can telework improve cybersecurity?

    Although the federal government is trying to encourage telework, a new survey shows agencies are losing workers because of a lack of telework opportunities at a time when a shortage of cybersecurity professionals is being called a threat to national security.

  • RFID and NFC enabled government identification

    The future of government ID cards

    Employee IDs cards are incorporating some relatively mature technologies that increase the level of interaction and tracking potential.

  • Device authentication tool helps detect tax fraudsters

    Experian's Tax Return Analysis Platform goes beyond identity verification to offer device-proofing, catching fraud before refunds are processed.

  • Cybersecurity key at Department of Heath and Human Services

    HHS and health care sector expand cybersecurity info sharing

    The Computer Security Incident Response Center, the centerpiece of HHS's cybersecurity program, helps provide situational awareness across the enterprise and strengthens functional relationships within the health care community that it oversees to help improve security.

  • Security for the Internet of things by securing systems embedded in hardware

    U.C. San Diego researchers build tool to help secure IoT

    A group of computer scientists at the University of California, San Diego, have developed a tool that lets designers and system builders test embedded hardware security, a first in the field.

  • A Science DMZ protects research data on a high-performance network

    Science DMZ: faster, more secure high-performance computing

    Built near the network perimeter, a Science DMZ is a portion of the network optimized for high-performance scientific applications rather than for general-purpose business systems.

  • Wrenches and bolts to tighten security for the Internet of Things

    Tools to tighten the Internet of Things

    Built with cost and performance in mind, interconnected systems contain vulnerabilities that are increasingly attractive to attackers looking for protected information or who want to disrupt public services. Some tools are emerging to help.

  • Network forensics enhances Army NIE

    An Army network forensics team made a positive impact on network troubleshooting, reliability and network protection at the latest Network Integration Evaluation field evaluation.

Topic Resources

  • Update on Assessment & Authorization (A&A) Processes for Cross Domain Solutions

    As introduced in our latest certification and accreditation (C&A) basics webcast (“Navigating Certification & Accreditation – A Primer) C&A terminology is transitioning to assessment and authorization (A&A). See the associated white paper “From C&A to A&A – The RMF Shoe Has Dropped.” Continuing the transition discussion, Raytheon Cyber Products and Steve Welke are pleased to present a webcast updating the latest information on A&A processes for cross domain, multilevel security solutions. Join Steve Welke, an A&A industry expert, as he discusses the A&A principles, requirements and processes.

  • Increase Data Security through Your Print Solution

    You’ve consolidated your desktops with virtualization and moved your data to the cloud. What else can you do to obtain additional costs savings and increase security while keeping your network flexible? Connect print and digital information from across your organization with the people who need it, exactly when they need it. Join this webcast to learn how security software and printing solutions work together to eliminate extraneous printers at multiple sensitivity levels, allowing organizations to recognize significant savings from reduced hardware, space, power, support and supplies.

  • IBM i2 National Security and Defense Intelligence Demo

    In this video IBM Product Manager James Vincent presents an overview and demo of IBM® i2® National Security and Defense Intelligence—a cost effective information exploitation solution that provides data acquisition, multi-faceted intelligence analysis and multi-agency and partner collaboration features.

  • Continuous Monitoring: Elevating Cybersecurity in State and Local Government

    State and local agencies are not required to comply with federal policies related to continuous monitoring and NIST's Cybersecurity Framework, but they would be better off if they did. Whether it is required or not, the concept of continuous monitoring has been proven to raise the level of cybersecurity when implemented appropriately and with the right tools. Join this webcast to learn more about how your agency could benefit from continuous monitoring and NIST guidance.