Plan for the next breach with incident response forensics

In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.

holistic security

Adopting a holistic approach to FISMA compliance

By examining the entire IT infrastructure, security teams can determine how best to assign controls and centralize tasks.

Watch out:  Smart city defenses are not up to snuff

Watch out: Smart city defenses are not up to snuff

A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.

cyber cloud certification

New cloud security certification debuts

Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.

Cyber risks inherent in NextGen transition, GAO warns

Cyber risks inherent in NextGen transition, GAO warns

The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.

HawkEye G adds threat analytics, third-party integration

HawkEye G adds threat analytics, third-party integration

The platform corroborates actual endpoint behavior with third-party data to help capture, analyze and remove malicious activity before it compromises resources.

Data-driven government

Salary shortfalls and scary skill gaps

A new NASCIO study details state governments' struggles to recruit and retain IT talent.

New tool boosts threat protection inside the perimeter

New tool boosts threat protection inside the perimeter

The iboss FireSphere Threat Isolator integrates the company’s advanced persistent threat solution with HP’s software-defined networking architecture.

SMB security flaw in Windows? Not really, says Microsoft

SMB security flaw in Windows? Not really, says Microsoft

Security researchers say they’ve uncovered a new technique for stealing login credentials from any Windows device, but Microsoft says it addressed the issue in 2009.

army seeks support for XP devices

Army seeks alternative for Windows XP support

According to a recent RFI, the Army will be ending its support contract with Microsoft but wants to ensure it can still avoid security vulnerabilities on its 8,000 Microsoft Windows XP devices.

solid password advice from an unexpected source

'Passwerd' is bad. Try 'Margaretthatcheris110%sexy'

Some solid password advice from an unexpected source.

'Polymorphic' botnet draws international attention

Beebone, or AAEH, allows multiple forms of malware to compromise security on a wide range of operating systems.