Encrypted passwords can be vulnerable because a decryption key must be available to the authentication server; hashed passwords cannot be decrypted and must be guessed by an attacker, which can be made impractical.
The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.
The multi-client Stratus includes three PCs and a remote controlled KVM to deliver security and convenience to government users who need to operate multiple PCs.
Although most widely known as a feature in consumer products, GPS timing and positioning is used in much of the nation's critical infrastructure, from managing air traffic to time-stamping financial transactions.
It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.
In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.
Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.
Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.