The NSTIC programs, which received more than $7 million in grants, range from military, civilian and commercial authentication initiatives to one aimed at protecting children’s privacy online.
This week's Biometric Consortium Conference showcases a wide range of hardware and software solutions for personal identification/authentication applications in government.
The agency is advising against using an elliptic curve algorithm adopted in 2006 that has concerned cryptographers from the beginning.
CyanLine's Fast Disk Acquisition System gives forensics teams a real-time preview of what's on a drive, including whether it's set to prevent copying.
The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.
The latest revision of FIPS 201, which sets the requirements for PIV cards, includes credentials for mobile devices and new interfaces to enable access with contactless connections.
Public concern over possible tampering by the NSA has led NIST to reopen the comment period on a suite of publications, but the IT security community isn't worried.
If opened to app developers, Apple's Touch ID could give another authentication option to agencies looking to manage mobile devices, especially if other smartphone manufacturers follow suit.
DNSSEC can be an effective tool -- but only one tool -- in preventing redirection attacks such as those carried out recently by the Syrian Electronic Army.
Holding the vendor accountable for results — and right away — is the first step in getting value from your cybersecurity investment, said USPS information security officer Chuck McGann.
Silent Circle releases its latest end-to-end encryption tool, which enables secure texting between Apple iOS and Android platforms. A secure, peer-to-peer email app is due next year.
Prolexic's SSL key-sharing tools make it easier to detect and stop encrypted Layer 7 DDoS attacks while customers maintain control of their SSL keys.