Agencies are cracking down on administrative access to mitigate the damage an insider can cause, but hackers are adjusting their tactics as well and aiming them squarely at the federal government.
The Archer monitoring and compliance platform from RSA is a finalist to provide a dashboard for Continuous Diagnostics and Mitigation that will give enterprise visibility into the security of federal IT systems.
The company's data CyberSecurity Edge ensures customers' systems and information are protected from cyber risks across multiple platforms.
With open-source Drupal as the foundation of a defense-in-depth strategy, agency IT managers can analyze and identify potential threat vectors, including internal and external threats.
The University of New Mexico will conduct field tests of recovery solutions for cyber-infrastructure backbone attacks from weapons of mass destruction and other real-world threats.
A GAO study finds that as the number of cybersecurity incidents in government information systems is increasing, agencies are having a tough time fully documenting their responses to these incidents.
Before making the jump to the cloud, IT managers need to lay the groundwork, ensuring the right technology and security protocols are in place as well as a complete understanding of the regulatory issues affecting the project.
The growing window between compromise and discovery on networks puts a premium on forensics, and this requires effective storage of large volumes of data.
Security, both physical and cyber, traditionally has been outward facing; but in the era of cyberwarfare, new tools are under development against a threat no one can afford to ignore.
As security challenges are addressed, the mobile conversation is moving from technology acquisition and introduction to assimilation into agencies' missions.
The ID card will be targeted to those who do not have a driver's license or other official identification and would allow New Yorkers, regardless of citizenship status, to access basic city services, open bank accounts and lease apartments.
A new software appliance is designed to manage encryption keys and credential files securely in an enterprise data center.