Einstein 3 goes live with automated malware blocking
The government's new intrusion prevention system will not only detect malicious traffic but stop that traffic before it does harm.
The mutating malware monster demands new defenses
Revised guidance from NIST on defending against malware reflects the evolution of malicious code, which is becoming more complex, dangerous and difficult to detect.
What's keeping FAA's NextGen air traffic control on the runway?
New technology for the FAA's Next Generation Air Transportation System is coming online -- slowly -- but non-technical issues are delaying many of the program's benefits.
AndroRAT signals commercialization of mobile malware
Mobile malware is not new, but a new tool in the cyber crime underground could ultimately pave the way for hackers to leverage malware in large mobile botnets.
Smart ID to offer options for iris scanning, on-card fingerprint matching
Updated specifications from NIST for the PIV card now include an option for iris scans in addition to fingerprint authentication and the ability to do on-card matching of fingerprints.
FirstNet offers a look into the makings of nationwide public safety network
The FirstNet board has issued RFIs on industry's ability to provide the technologies required for advanced public-safety grade network services and infrastructure.
Spy agencies look for tools to automate enforcement of two-man-rule for access
The intell community taps HyTrust to help enforce the two-man rule for administrative access to sensitive information in the cloud in the wake of Snowden's disclosures about domestic spying.
New domain names bound for collisions: 'Things are going to break'
Concerns persist that new generic Top Level Domains being approved for the Internet could conflict with internal naming schemes, disrupting networks with naming collisions.
Boom times for mobile security
Concerns about privacy, spying and leaks are creating demand for products and services that encrypt and protect mobile communications, and smart phones have the processing power to handle it.
EAS vulnerability exposes the soft underbelly of firmware
Sensitive keys included in freely available firmware opened the Emergency Alert System to attack, and researchers say the incident could be just the tip of the iceberg.
20 critical controls do improve cybersecurity, but are you using them?
A survey of security pros shows a high awareness of the 20 Critical Security Controls, but implementation is not yet mature. Government appears to be ahead of the curve.
Can agencies team up in responding to cyber attacks?
NIST is looking for ideas and best practices for a new publication that would be a "substantial expansion" of guidance on how incident response teams cooperate.
Can the two-man rule foil insider threats?
The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.
Next steps in making text-to-911 a reality
Major wireless carriers already have committed to delivering text messages to 911 by May 2014, and the FCC is considering rules to expand the requirement to all carriers and third-party providers.
Agencies showing sudden interest in encrypted comm
Growth of BYOD encryption company Silent Circle, already robust, has skyrocketed in the wake of revelations of NSA surveillance, and government is the biggest customer.
Just what does NIST consider a mobile device?
Any guide to mobile technology is a work in progress.
Mobile security guide: Assume a device will fall into malicious hands
NIST has updated its guidance for securely managing mobile devices, addressing advances in the technology and the move toward BYOD since its original publication in 2008.
The rising danger to data is making KMIP important
The evolving key management standard is gaining traction in the cloud as a way to ensure security across varied infrastructures.
Text-to-911: Call when you can, text when you must
As text-to-911 service begins appear around the country, the FCC, public safety agencies and carriers warn that it is a complement to and not a substitute for voice calls in an emergency.
When NextGen 911 services show up, cloud-based call centers will be ready
Durham, N.C., is one a handful of jurisdictions that have moved 911 call centers to the cloud, preparing to implement a full range of IP-based services as they become available.
Do Not Sell My Personal Information
When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
Manage Consent Preferences
Strictly Necessary Cookies - Always Active
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data, Targeting & Social Media Cookies
Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.
Cookie List
A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
Strictly Necessary Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Functional Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Performance Cookies
We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
Sale of Personal Data
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Social Media Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Targeting Cookies
We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
Help us tailor content specifically for you: