NIST has updated more than 200 pages of security words from federal documents to provide a central resource for definitions of cybersecurity terms.
Automating IT security can be a help in protecting assets and systems, but there are some caveats to keep in mind.
SCAP sets standards to ensure products work together, while Einstein is evolving into an automated tool that will not only detect, but block, malicious code.
A growing number of products can help automate IT security; Nevada's DOT found they can help in other areas, too.
The agency has released a draft of a cloud security architecture intended to provide the security needed to speed government adoption of cloud computing.
Shuttle Computer's HR70 biometric scanner can enforce access control through facial recognition, with optional ID card and fingerprint scanners.
MIT researchers develop a new functional-encryption scheme that could process cloud data while keeping it encrypted.
A combination of an e-filing portal and LexisNexis identity verification services automates filing and verification of people applying to claim abandoned assets.
The joint operation cuts off more than 1,400 botnets used in the theft of $500 million worldwide, but it also shows how nimble cyber criminals are in distributing their malware.
The company's new phone harkens to the days of old with a physical keyboard, while adding new functionality and security features with Version 10.1 of the OS.
The Mobile Security Reference Architecture is one more guide for agencies wrestling with how so securely bring smart phones and tablets into their networks.
Most vulnerabilities are discovered by third parties, but the fact that the department was alerted by a “law enforcement partner” raises the question of whether a breach occurred.