In order to manage your mobile risk portfolio, agencies should start an analysis of mobile demand across different employee segments.
As a N.C. state legislator found out the hard way, errors caused by workplace fatigue can have decisive and sometimes irreversible results.
Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.
The theft of Yahoo passwords, including those of government users, highlights the problem with weak authentication. But it doesn’t have to be that way.
SAS Security Intelligence platform uses a common infrastructure to detect and prevent threats across government agencies and industry.
Proposed changes in FIPS 201 reflect changes in the technology and environment in which the federal PIV cards for government workers and contractors are used.
The patch for the XML Core Services flaw doesn't yet cover every version, but it does cover the version being attacked.
NIST's revised guidance sharpens the focus of the original publication, released in 2008, excluding laptops and low-end cell phones, and covering both enterprise-issued devices and BYOD.
The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.
Bad weather in the past year has done what terrorists haven’t managed – disrupt power for a week or more at a time. Officials say Smart Grid technology could ease the pain.
Trojan apps are the primary means of infecting mobile devices; the good news is that you can prevent installation of malicious apps on your device.
Federal agencies were mostly cleared of the malware but for others who lost Internet access, some ISPs softened the blow by redirecting their DNS queries to internal help pages.