CIA chief information officer Doug Wolfe ushers in an era of cloud computing to the intelligence community, offering powerful new tools for rapid data integration and analytics.
DARPA asks researchers to submit proposals for SafeWare, a new approach to code obfuscation that makes software nearly impossible to attack.
As FireEye's global government liaison, Tony Cole brings governments the technology and insights to thwart a new generation of motivated attackers.
University of Georgia’s private cloud deployment saved it more than $7.5 million compared to public cloud hosting, and Virginia’s focus on two significant attack vectors helped it reduce the frequency of the malware incidents.
Detectives and information security professionals can learn not only from each other’s best practices, but also from tactics each follow to ensure they are avoiding common mistakes.
Apple's latest security improvements in iOS 8 make iCloud backup acquisition the only way for criminal investigators to access the suspect's smartphone data.
With government networks growing more complex, here are three ways network administrators can simplify their approach to managing federal networks.
The Naval Sea Systems Command’s Information Office, which manages NAVSEA’s IT workforce, was charged with picking up the pieces after a tragedy struck the Navy Yard one year ago.
The military-grade cybersecurity appliance eliminates risks associated with operating industrial control systems over networks.
GCN names Department of Army Deputy CIO Michael Krieger, Central Intelligence Agency CIO Doug Wolfe and FireEye Inc. Global Government Liaison, Tony Cole as 2014 GCN executives of the year.
Security playbooks powered by intelligent automation can mitigate the fallout from breaches while meeting important compliance standards.
Because no single approach can detect every threat, hybrid analytics can help IT managers uncover hidden, suspicious activities and see the bigger picture.