Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.
GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.
Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.
Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.
A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.
The ZBook 15 is a powerful workstation in every way except size and shape.
QKD uses a photon's polarization and spin to verify an unobserved key transmission.
NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.