Search Results for "" Security ""
Incoming: Cutting the Gordian Knot of Privacy
I feel a sense of disappointment as I think about how much the cyberspace landscape has changed over the last 40-plus years and how little our nation’s privacy laws have done to keep up with this digital transformation.
Leveraging Private and Public Networking to Support Critical Infrastructure
When we think about critical infrastructure, specifically the sectors the Department of Homeland Security has deemed essential to the well being of the country, rarely does the idea center on public networking assets to support critical infrastructure. But a rapid transformation of network technology and security improved processes so that agencies now can take advantage of combined public and private networking to accomplish information technology goals.

Halvorsen Offers a Different Take on the Insider Threat

New Analytics Research Could Help Thwart the Insider Threat

Encrypted Internet Traffic a Key Cybersecurity Threat

Using Predictive Analytics to Identify External Threats
Stopping insider threats has become a unifying cybersecurity mission, particularly in the defense and intelligence communities. And for good reason. Typically, the words "insider threat" might conjured up the likeness of Edward Snowden. But the reality is much scarier, writes blogger Eddie Garcia.

Predictive Analytics Tools Confront Insider Threats

Communications Security Monitoring Can Reduce Insider Threats
The adage is true: What’s old is new again, and while we think the technology of today might cure the ills of yesterday, some problems persist. It might be time to explore how methods that helped isolate insider threats from history can succeed in protecting modern infrastructure.

NIST Pilot Projects Seek to Improve Cybersecurity, Reduce Online Tax Fraud and Identity Theft
NIST awarded nearly $3.7 million for three pilot projects that seek to fortify online financial transactions and enhance privacy protections for health care, government services, transportation and the Internet of Things. The studies address specific cyber-based missions such as reducing tax refund theft, among others.

A Three-Pronged Attack Against Cybersecurity Threats
Welcome to the security world, where agencies worry about cyber attacks from the outside as much as from the inside. Guest blogger Ed Bender highlights some surprising results from a recent survey in which respondents lament the insider threat; both from those who intend harm and those who inadvertently invite it.