The Cipher USB FLE from Addonics, which itself looks like a key drive, can encrypt files on any drive or host PC.
Sensitive keys included in freely available firmware opened the Emergency Alert System to attack, and researchers say the incident could be just the tip of the iceberg.
A survey of security pros shows a high awareness of the 20 Critical Security Controls, but implementation is not yet mature. Government appears to be ahead of the curve.
The Pentagon expects to have its own network up and running by next year, as part of its new push for better cybersecurity.
NIST is looking for ideas and best practices for a new publication that would be a "substantial expansion" of guidance on how incident response teams cooperate.
NIST has updated its guidance for securely managing mobile devices, addressing advances in the technology and the move toward BYOD since its original publication in 2008.
The evolving key management standard is gaining traction in the cloud as a way to ensure security across varied infrastructures.
More than two thirds of organizations with sensitive information in the cloud protect it with some kind of encryption before it leaves their hands. Who handles that encryption?
SEM's Optical Media Destroyer can slice and dice up to 2,400 CDs or DVDs an hour, turning them into shards that exceed NSA/CSS standards.
FISMA oversight by the department remains a work in process, and CyberScope has provided only limited help, according to an inspector general's report.
NIST has updated more than 200 pages of security words from federal documents to provide a central resource for definitions of cybersecurity terms.
Automating IT security can be a help in protecting assets and systems, but there are some caveats to keep in mind.