Persistent tracking of endpoint devices takes on insider threats

Persistent tracking of endpoint devices takes on insider threats

Absolute’s Endpoint Data Discovery allows organizations to identify and protect sensitive data stored on endpoint devices outside the enterprise network.

Proving ground aims to spur rapid fielding of cyber tech

Proving ground aims to spur rapid fielding of cyber tech

To counter the pace of cyberattacks, the new Air Force Cyber Proving Ground aims to rapidly get cyber tools to operators.

What comes after common access cards?

What comes after common access cards?

The future of authentication could start with mobile devices and apps that track user location and behavior, DISA Director Lt. Gen. Alan Lynn said.

Identity management

Building on the cybersecurity sprint with CDM Phase II

Agencies that focus on a governance-based identity and access management strategy can protect against the full range of identity-centered attacks.

DOD officials push back on civil cyber support

DOD officials push back on civil cyber support critiques

During a recent panel discussion, Pentagon officials pushed back on criticisms that there is lack of clarity on how the Defense Department will respond to domestic cyberattacks.

cybersecurity confidence erodes

Feds' trust in agency cybersecurity erodes

A new survey shows a significant decline over the past two years in federal employees’ trust in their agency’s ability to protect information systems.

milware attacks

NSA's Quade: ‘Milware’ defense requires automated security

Integrating automation into network defenses will become increasingly important as threats become more sophisticated and diverse.

Smart badge features indoor location tracking

Smart badge features indoor location tracking

The mBeaconCard identity card enables wireless tracking and contactless applications, such as access control, payments processing and workforce analytics.

The GCN dig IT Awards: A call for nominations

The GCN dig IT Awards: A call for nominations

Celebrating discovery and innovation in government IT.

textalyzer for field analysis of texting while driving

‘Textalyzer’ may give police evidence of distracted driving

A bill in New York calls for a device that can field-test electronic devices after an accident for proof of their unlawful use while driving.

security plan

18F automates compliance documentation

The Compliance Masonry platform lets users actively interact, update and generate assurance reports for any type of risk management framework.

governments get failing grades in cybersecurity

Government still failing to protect IT systems

A new report finds that government agencies at all levels ranked dead last in cybersecurity against major private industries.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.


More from 1105 Public Sector Media Group