Army adds Fidelis data protection solution to approved products list

Fidelis Extrusion Prevention System protects operations security and classified data from within the organization as well as from external attacks.

DHS plans wiki for agencies, cybersecurity centers to coordinate efforts

The Homeland Security Department plans a new wiki that federal cybersecurity centers would use to coordinate efforts and improve situational awareness.

Security group introduces new scheme for sharing malware data

A consortium of IT security companies formed under the auspices of the IEEE Standards Association is rolling out an XML metadata scheme for malware to improve data sharing within the industry.

Russian military, organized crime in on cyberattacks against Georgia

The August 2008 denial-of-service attacks against Georgian Web sites was conducted by Russian civilians and coordinated with the Russian military invasion and organized crime, according to the U.S. Cyber Consequences Unit.

Departures of top cybersecurity officials reflect realities of governing

The recent resignations of White House cybersecurity adviser Melissa Hathaway and US-CERT director Mischel Kwon should not be construed as indicators that cybersecurity has fallen off the Obama administration's radar screen.

Readers expound on the pro and cons of agile development

In a response to a commentary about being wary of some information technology trends, readers discuss the value of agile development.

Law enforcement can take advantage of Lawful Intercept solutions

Lawful Intercept, which allows law enforcement to monitor communications, can now pinpoint the locations of wireless handsets to within tens of meters, allowing police and investigators to better coordinate a swift response to rapidly changing situations, writes Martin Feuerstein of Polaris Wireless.

Navy's network security roadmap explained during Virtual FOSE

Navy Department Chief Information Officer Robert Carey will be the keynote speaker at tomorrow’s Virtual FOSE conference.

Microsoft to release nine patches in August security update

The usual suspects are expected to appear in the Aug. 11 slate, including remote code execution, elevation-of-privilege and denial-of-service risk considerations.

Government, industry create threat forum for power grid

EnergySec has grown to include 200 members from the electric power industry, security vendors and government regulators since its formation in December to provide an alternative to the more formal ISAC for rapid sharing of information.

Alma Cole works to keep CBP, DHS a step ahead of malicious attacks

When it comes to protecting the Customs and Border Protection and the Homeland Security Department from emerging cyber threats, it’s always good to be one step ahead of potential attackers. Alma Cole, branch lead of CBP’s Focused Operations team within the Office of Information and Technology, takes that concept to heart.

Digital certificate standard yields to hackers

Researchers at the Black Hat Briefings demonstrated exploits against the X.509 standard for digital certificates used by Secure Sockets Layer. Dan Kaminsky urges the industry to patch their implementations until a complete replacement scheme is available.

Web site hacking: Terrorism or rogue diplomacy?

It doesn’t really reach the level of terrorism, but some countries seem to be including online attacks in their portfolio of diplomatic activities.

Meeting the Cyber Challenge

The announcement of a new U.S. Cyber Challenge by a coalition of government and private groups last month marks the latest salvo in what many agree is an increasingly serious shortage of skilled cybersecurity experts.

Biometrics technologies vital for combat success

Biometrics said to give combat troops critical capabilities to carry out their missions.

Triumfant Resolution Manager

Triumphant earns a Reviewer’s Choice for its ease of use, features and capabilities, such as its ability to scan more than 200,000 attributes on every client and detect and fix changes in minutes.

Trend Micro Version 6.0 Advanced

The WFBS was designed for offices or agencies that have few or no network administrators or bare-bones IT support. Trend Micro engineered this small, robust piece of software to be almost completely automated.

Symantec Endpoint Protection 11.0

Symantec needs to support more operating systems and make the interface a little easier to use, but Endpoint Protection 11.0 is still an ideal security platform if you need a thick security blanket for a midsize to large enterprise.

Sophos Endpoint Security and Data Protection

Despite the high-sticker price, we found the versatility, compatibility, features and ease of use make Sophos worth the Reviewer’s Choice designation for the best antivirus solution in this roundup for midsize to large networks.

Red Condor Hosted Service

Red Condor provides a comprehensive system that inspects all incoming and outgoing network traffic for bugs and malware.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.