Reportedly concerned about unauthorized disclosures, FDA officials installed monitoring software on some scientists’ laptops. The scientists say the action is in retaliation for blowing the whistle.
Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.
Agencies wondering whether to encrypt their data or mobile devices should take note of the trouble encryption is giving security researchers and the worries it gives the Justice Department.
The Inspector General says the consolidated Security Operations Center has improved its security but still has some key vulnerabilities.
Mobile apps often take liberties with your personal data; this tool lets you know what they're up to.
Incident response has become an integral part of IT security and NIST offers updated guidelines for handling breaches.
The attack, which started Aug. 3, started as WikiLeaks was releasing information on an allegedly secret, sophisticated surveillance program.
If your agency delivers information and services through website applications, be ready for plenty of "battle days," according to an Imperva study.
Discovery of the state-sponsored (wink, wink) Gauss malware proves once again that, in cyberspace, nothing stays secret for long.
The ransomware can download from a compromised website and freeze a user's computer, demanding that they pay a 'fine.'
A survey of managers finds that a majority have little or no knowledge of how their providers protect their data.
Alaska's enterprise architect offers tips for overcoming migration hurdles to deploying so-called fabric or unified computing.