After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.
Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.
Fujitsu introduced two 'enterprise-ready' Windows tablets this week, targeting government users who need extra security features.
The provider of software-centric and cloud-focused load balancer solutions now supports integration with Defense Department environments using CAC authentication and Active Directory application infrastructures.
The Defense Information Systems Agency released a draft of cloud computing security requirements for the Defense Department.
Tools and services are being chosen for Phase 2 of the Continuous Diagnostics and Mitigation program, which security watchers say could be a revolutionary step in how the government protects its information.
BlackBerry Classic returns to the old form factor and includes BlackBerry Balance, the technology that allows personal and work data to reside in separate partitions on the device.
Mobile app management can help government IT pros who want to take advantage of the savings mobile apps bring but still need to secure the enterprise.
The technology used to control access to nuclear weapons could secure other applications that use encoded protection, such as communications and the IT supply chain.
The Department of Homeland Security will explore developing an environment for automated cybersecurity and shared situational awareness.
University of Michigan researchers have formed a group to establish a new HTTPS certificate authority and support their aim to ‘reinvent’ Internet security.
The DOD research agency wants to develop techniques for seeing more deeply into today’s opaque networks to more effectively combat advanced persistent threats.