The guidance covers protecting information processed, stored or transmitted on replication devices, which are those that copy, print or scan documents, images or objects.
A robust monitoring fabric will intelligently filter, correlate, normalize and deliver the appropriate traffic to the agency’s security, monitoring and management systems.
Hyperion, which can recognize malicious software even if the specific program has not been identified as a threat, was licensed to R&K Cyber Solutions LLC of Manassas, Va.
Four months after a breach and takedown of its unclassified email networks, the State Department has not been able to rid its network of hackers.
Digital wallet services give customers options to initiate transactions via the Internet or mobile apps without the need to enroll in a system or provide personal information.
Absolute Software Corp.’s Device Freeze Offline Policy lets IT managers set an automated freeze command for any device that remains offline for a specified period of time.
Officials at the Department of Homeland Security have been warning of the consequences to technology programs in the event of a DHS shutdown.
The Box Enterprise Key Management is cloud-enabled content management and collaboration system that gives enterprises full control over encryption keys, while preserving Box user experience.
Because tax fraud is pervasive, governments enlist identity verification technology to ensure refunds go to the correct taxpayer.
The Defense Department released an updated cloud security requirements guide that outlines controls and additional requirements necessary for using cloud-based solutions within DOD.
Recent modifications to IT standards confirm a changing approach to security, interoperability, and performance metrics by the National Institute of Standards and Technology.
The Veterans Affairs Department is gathering information on acquiring a security incident event management service to help it manage the entire VA cybersecurity enterprise.