Apple's latest security improvements in iOS 8 make iCloud backup acquisition the only way for criminal investigators to access the suspect's smartphone data.
With government networks growing more complex, here are three ways network administrators can simplify their approach to managing federal networks.
The Naval Sea Systems Command’s Information Office, which manages NAVSEA’s IT workforce, was charged with picking up the pieces after a tragedy struck the Navy Yard one year ago.
The military-grade cybersecurity appliance eliminates risks associated with operating industrial control systems over networks.
GCN names Department of Army Deputy CIO Michael Krieger, Central Intelligence Agency CIO Doug Wolfe and FireEye Inc. Global Government Liaison, Tony Cole as 2014 GCN executives of the year.
Security playbooks powered by intelligent automation can mitigate the fallout from breaches while meeting important compliance standards.
Because no single approach can detect every threat, hybrid analytics can help IT managers uncover hidden, suspicious activities and see the bigger picture.
IBM and AT&T formed a partnership to let customers connect their private IT systems to IBM's SoftLayer cloud using AT&T's NetBond secure virtual private network service.
Agencies can ease the transition to cloud-based CDM by ensuring they have the appropriate FIPS 199 alignment, legal requirements, contract considerations, technical compatibilities and experience.
As agencies seek to increase productivity in the field they are increasingly looking to get mobile devices like smartphones, tablets and 2-in-1 devices into the hands of their employees.
According to the GAO, inadequate access control is a common weakness across 24 major agencies.
While data and device encryption is the first line of defense, it is not impervious to attack, so diligent IT departments should take a layered and persistent approach to security.