Dynamic firewall to help defend from DDoS attacks

Dynamic firewall to help defend from DDoS attacks

With DHS funding, Waverly Labs is developing a software-defined perimeter that would open up the firewall only when it gets single packet authorization from the network client.

Removing the blindfold to inspect encrypted communications

Without visibility into encrypted communications, IT managers can see only a portion of their network traffic, making them unable to identify and defend against threats.

Virtualization can double breach recovery costs

Virtualization can double breach recovery costs

According to a recent survey by Kaspersky Lab, the average cost of breaches involving virtual infrastructure can be double those that occur in a traditional environment.

MorphoTrust moves biometric authentication to the cloud

MorphoTrust moves biometric authentication to the cloud

The Identix trusted identity-as-a-service biometric platform can help agencies prevent fraud and identity theft and enhance authentication.

NIST announces latest funding for trusted identies

NIST announces latest funding for trusted identities

The National Institute of Standards and Technology has awarded $3.7 million in grants to three companies to make online transactions more secure and private.

ONR moves to protect ships’ systems from cyberattacks

ONR moves to protect ships’ systems from cyberattacks

The Office of Naval Research is spearheading a program to protect against cyberattacks to onboard physical infrastructure.

DARPA wants better detection of doctored images

DARPA wants better detection of doctored images

The Defense Advanced Research Projects Agency Media Forensics program aims to build better tools for identifying image manipulation.

document security

Taking the 'cyber' out of security

With these three steps, agencies can craft new policies and build a culture that protects both digital and physical records.

people voting in California

Will America’s voting machines make it through the next election?

A recent report by the Brennan Center for Justice found that 43 states are using voting machines that will be at least 10 years old by November 2016 -- raising the risk for Election Day delays, lost ballots and worse.

New tool wipes hard drives -- remotely, in bulk and to DOD standards

New tool wipes hard drives -- remotely, in bulk and to DOD standards

The latest release of Jetico's hard drive wiping software, BCWipe Total WipeOut, includes central management for both wiping and reporting remotely over a network.

How digital identity will power smart cities

How digital identity will power smart cities

Digital identity management technology allows devices to securely recognize and interact with each other, improving the quality of civic services and city planning.

After the OPM breach: ripple effects and lots of lingering questions

After the OPM breach: ripple effects and lingering questions

A panel of cybersecurity experts explore the lessons learned from the breach and how Defense agencies can best defend their networks.