With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.
Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.
Cyber pros from across the military hone their skills against a realistic adversary on a closed network in an 11-day U.S. Cyber Command exercise.
VMware and Palo Alto Networks offer integrated platform to unify network security across both physical and virtual cloud enterprises.
Security Innovation says offering its public key cryptography for use in open-source community would head off a looming ‘cyrptopocalypse’ caused by limited choice of encryption algorithms.
Two of Symantec's public key infrastructure products receive approval for use by federal agencies and contractors.
Encrypted passwords can be vulnerable because a decryption key must be available to the authentication server; hashed passwords cannot be decrypted and must be guessed by an attacker, which can be made impractical.
The Defense Logistics Agency is using botanical DNA marking technology to battle a rise in counterfeit electronic parts and devices.
The multi-client Stratus includes three PCs and a remote controlled KVM to deliver security and convenience to government users who need to operate multiple PCs.
Although most widely known as a feature in consumer products, GPS timing and positioning is used in much of the nation's critical infrastructure, from managing air traffic to time-stamping financial transactions.
It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.
In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.