Galois wins DARPA funding for private data as a service

Galois wins DARPA funding for private data as a service

In support of the Defense Advanced Research Projects Agency’s Brandeis program, the company’s Jana project will deliver a privacy service that protects data while retaining its utility for analysts.

DOD CIO awards

DOD CIO winners honored for security, savings

The Department of Defense announced its 2015 Chief Information Officer Award for Cyber and IT Excellence winners.

AF seeks security solutions with kill chain integration, spectrum awareness

AF seeks security solutions with kill chain integration, spectrum awareness

Through a recently issued broad agency announcement, the Air Force is seeking to address kill chain integration and full spectrum awareness of emerging threats.

Virginia turns attention to the cyber talent shortage

Virginia turns attention to the cyber talent shortage

Public- and private-sector officials discuss cybersecurity workforce issues at the inaugural Commonwealth Conference on Cyber and Education.

Cybersecurity is a team sport, but it’s no game

Cybersecurity is a team sport, but it’s no game

Individual users, small agencies and large enterprises can all contribute to raising the bar for cyber protection, making it more difficult and more expensive for cyber criminals to achieve their objectives.

Asking DHS to hack your systems

Asking DHS to hack your systems

The Department of Homeland Security's National Cybersecurity Assessment and Technical Services can help governments at all levels learn how their networks look to would-be attackers.

Ransomware on SLED networks

Malware, ransomware twice as likely to hit state, local networks

After evaluating over 30 million alerts from its users around the world, Sentinel IPS found that 67 percent of government networks and 72 percent of education networks triggered critical malware or ransomware alerts.

mobile device management

The future of mobile data management

Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.

Dell ships laptops with certificate vulnerabilities

Dell ships laptops with certificate vulnerabilities

The company has released a patch that fixes the flaws that could give hackers access to private information.

How SDN builds next-gen security

How SDN builds next-gen security

A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.

smartphone access to IoT in home

Making mobile phones the authentication hubs for smart homes

With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.

5 ways the U.S. government can get security right

5 ways the U.S. government can get security right

Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.

Topic Resources

  • GameChanger: Microsegmentation

    In less than a decade, more than 87 million records with sensitive or private information have been exposed due to cyber-incidents on federal networks alone. Increasingly, organizations are beginning to realize that perimeter-based security just isn’t enough anymore. Download to learn how for many data centers, the solution is microsegmentation.