With threats on the rise and skills at a premium, how do cybersecurity personnel close the technology and resource gaps?
NSTIC is funding five pilot programs that mark a major step toward creating a digital identity ecosystem to enable greater online transactions by government and the private sector.
With an eye toward protecting patient privacy, HHS offers tools for keeping health data protected on mobile devices -- advice that any public-sector agency could follow.
Good Technology's product fits over an iPhone 4 or 4s and contains a smart-card or microSD reader for two-factor authentication.
A list of information security terms from federal documents is being updated by NIST to provide a central resource of common terms and definitions.
The all-too-easy hack of South Carolina's Department of Revenue could have been prevented by a dual-password system. How does it work?
The Florida city is building out a city-wide digital video surveillance system and is using a management system to integrate feeds so police can get real-time views of the city.
Suite lets administrators manage rules and encryption profiles of notebooks and smart phones from a single console.
Cryptography is only as secure as the keys used to encrypt and decrypt data. NIST shows agencies how to make them strong.
Continuous monitoring of IT systems can help maintain and improve security, but it is not necessarily easy to do. The National Institute of Standards and Technology has published guidance to help with the job.
Software encryption of laptop hard drives containing sensitive information certainly raises the bar on security, but for hackers, it's just one more password to crack.
Continuous monitoring of IT systems is changing the way agencies approach federal security regs, but it can only be effective on fundamentally sound systems, say government security pros.