The growth in cyberattacks and the theft of intellectual property has prompted calls for more aggressive cyber defense. The Pentagon and an independent commission are taking up the cause.
The software supports CAC and PIV card authentication, and meets NSA and DISA requirements for secure Bluetooth communication.
What agencies can do to manage the risks of using consumer cloud accounts such as iCloud, Evernote and Dropbox to store and access business data.
Florida's Department of Children and Families is using LexisNexis Risk Solutions, which creates a profile based on customer-supplied information, to authenticate people applying for public assistance.
A new app works with the cards on iOS and Android platforms, as will future versions of BlackBerry 10.
AWS gets approval to offer cloud services under the Federal Risk and Authorization Management Program, which agencies use to assess the risks of cloud services.
Comments on a NIST request about developing a cybersecurity framework for protecting critical energy, utilities and information systems show where work needs to be done.
Cybersecurity must become a full partner with IT and get more aggressive in searching out threats in order to effectively fulfill its mission of supporting agency missions.
Rather than trying to keep up with and get ahead of malicious software, hardware security can help ensure that devices are safe and remain uninfected, says Imation's Larry Hamid.
The service's industrial controls get smarter during its quest for "net zero" buildings, which brings cybersecurity into play.
Although malware can evade signatures and other filters, its code leaves telltale tracks that can be discovered through traffic analysis, analysts show in FOSE demonstration.
SAFECode, an industry group promoting reliability in commercial software, is releasing a free online training course on the basics secure software development.