MIT researchers develop a new functional-encryption scheme that could process cloud data while keeping it encrypted.
A combination of an e-filing portal and LexisNexis identity verification services automates filing and verification of people applying to claim abandoned assets.
The joint operation cuts off more than 1,400 botnets used in the theft of $500 million worldwide, but it also shows how nimble cyber criminals are in distributing their malware.
The company's new phone harkens to the days of old with a physical keyboard, while adding new functionality and security features with Version 10.1 of the OS.
The Mobile Security Reference Architecture is one more guide for agencies wrestling with how so securely bring smart phones and tablets into their networks.
Most vulnerabilities are discovered by third parties, but the fact that the department was alerted by a “law enforcement partner” raises the question of whether a breach occurred.
The company’s governance, risk management and compliance package provides enterprisewide analysis in a SaaS model.
The federal government has been defending the nation's online resources since the early days of the Internet. Here's a look at some of the key milestones.
Interoperability standards will create a world of interconnected clouds fraught with opportunities and security risks, experts say.
During the first 40 years of the Internet, security has been about patching mistakes; the future will be about creating an environment that is secure by design and protected by big data.
Kingston's DataTraveler 4000 drive, with ESET's ClevX DriveSecurity, keeps data and networks safe without significantly slowing down transfer times.
The growth in cyberattacks and the theft of intellectual property has prompted calls for more aggressive cyber defense. The Pentagon and an independent commission are taking up the cause.