Blog     e-Newsletter       Resource Library      Directories      Webinars
AFCEA logo


Fixing the Identity Credentialing Problem

August 17, 2009
By Maryann Lawlor

Companies now can acquire certified identity credentials that facilitate employees’ physical and logical access when they work with the U.S. Defense Department, other government agencies and government-affiliated organizations. A biometrics-infused card authenticates a person’s identity using bar codes, a digital photograph and fingerprints. Through a not-for-profit association, contractors become part of an operational system that can exchange credential information with the government.

Webinar: Securing the Data Center

April 23, 2009
By Henry Kenyon

Next in SIGNAL's webinar series, "Securing the Data Center: A DOD Architecture for Information Assurance" will take place on May 7, 2009 at 11:00 AM ET. Targeted attacks by hackers and insiders are aimed where they'll do the most damage and where the most valuable assets are located - the agency data center. Government agencies can increase protection and reduce operational costs when security issues are considered at the very beginning of data center planning. So it's ironic that data center security is often an afterthought. A well thought-out defense-in-depth strategy includes multiple layers of security and different overlapping technologies.

Attendees will learn how a secure data center architecture can:

  • Enable secure rollout of Web 2.0 and SOA services
  • Achieve Policy and Regulatory Compliance
  • Protect Data and Communication Integrity & Privacy
  • Enable Secure Email and Web Transactions
  • Prevent Data Leakage and Disclosure
  • Provide Comprehensive Threat Control

Panelists include:

  • Rich Campbell, Senior Systems Engineer, Cisco Data Center Solutions
  • Andrew Benhase, Consulting Systems Engineer, Cisco Security Solutions
  • Michael Jones, Federal Security Services Manager, Cisco Federal Services

For additional details, including how to register, click here.

Plan Revamps Security Clearance Process

August 2008
By Maryann Lawlor

Say the words “security clearance” in a conversation with defense contractors, and the vast majority has a tale to tell of long waits and missed opportunities. Those two words have people in Washington, D.C., talking too. For two years, the organizations in charge of the security clearance process have worked hard to improve it. But for many, the time for revamping the old is over, and the time for creating a new process has begun.

Alliance Solves Collaboration, Security Problems

October 2007
By Rita Boland

The requirement to protect information and the necessity to share information frequently conflict, but government and industry obligations to do both effectively, efficiently and simultaneously now are connecting these two near opposites. A partnership of companies, both large and small, is combining resources and skills to enable the government to provide information to those who need it while denying access to those who do not.

Insider Cybercrime Finds No Place to Hide

February 2001
By Christian B. Sheehy

Advances in computer network security are empowering network-dependent organizations to address the sobering fact that a majority of threats to proprietary information today originate within the pool of authorized users. A new off-the-shelf software application that monitors the flow of data through a network enables organizations to counter internal threats to sensitive information by identifying the source of a violation. The U.S. Defense Department is exploring the software as a way to address its security concerns.

Adaptive Response Tool Foils Hacker Intrusion

August 1999
By Henry S. Kenyon

Software designers are applying artificial intelligence principles to new computer security systems. These tools and protocols create the potential for agile software capable of quickly identifying and responding to new threats.

Digital Credentials Kick Off New Commerce Procedures

August 1999
By Maryann Lawlor

The company that created the secure sockets layer to manage network message transmission security, and today opens the Internet to tens of millions of people around the world, is now collaborating with the U.S. Defense Department to secure cyberspace communications and transactions.

Minuscule Combination Lock Safeguards Silicon Capital

August 1999
By Maryann Lawlor

The mechanical principles that protect personal belongings inside a high school locker may hold the key to guarding digital assets. Creators of a miniature combination lock, which consists of six gears that together are the size of a shirt button, believe the device guarantees that systems can be shielded from invasions with a one-in-a-million chance that an intruder can break the code.

Hidden Hazards Menace U.S. Information Infrastructure

August 1999
By Robert K. Ackerman

The greatest threat to U.S. security may come from internal software or hardware trapdoors lying dormant in the nation's critical infrastructure. The digital equivalent of Cold War moles, these hidden threats would serve as access points for criminals, terrorists or hostile governments to extort money, impel foreign policy appeasement or ultimately launch crippling information attacks on the United States.

Integrated Circuit Chip Provides Secure, Rapid Data Encryption

October 1999
By Michelle L. Hankins

Researchers at the Department of Energy's Sandia National Laboratories have developed a new encryption device that promises the security and bandwidth accommodation necessary to scramble various types of data at speeds unmatched by many other encryption technologies.


Subscribe to RSS - Security