DOD's inspector general says the Army is "unaware" of some 14,000 smart phones and tablets, many of them unmanaged and unsecure.
For iOS and Android devices, Secure Gesture from Fixmo and Lockheed Martin lets users log in with a touch-screen gesture that can be almost impossible to duplicate.
With the FIPS 140-2 validated TrustChip, KoolSpan's solution is the first hardware-encrypted security for the iPhone 4 series.
Three quarters of government computers are running unsupported versions of Java, according to a Websense analysis, leaving them vulnerable to a long list of malicious exploits.
NASA closed down its Technical Reports Server for review after the arrest of a suspected spy and a congressman’s concern over the potential availability of sensitive documents.
Group has developed a standard features set to use for fingerprint identification, and NIST now has the technical specs to make searches interoperable.
The new Compliance Software Blade lets USF Health easily answer the question, "How are we doing on compliance?"
If agencies are to stop being reactive in addressing cybersecurity, they must first change the way security is implemented on the ground floor.
Firewall vendors are stepping up to improve performance and fix problems, according to the results of the most recent comparative tests conducted by NSS Labs.
The Aegis Secure Key, with a numeric keypad and 256-bit AES encryption, meets the standards for FIPS 140-2 Level 3.
OMB's FISMA report says performance varied widely among agencies, though there was progress in three key areas.
The Silent Circle crypto service could solve BYOD security through peer-to-peer encryption, and although that could keep authorities from snooping on calls, military and intelligence agencies are getting on board.