NIST has updated its guidance for securely managing mobile devices, addressing advances in the technology and the move toward BYOD since its original publication in 2008.
The evolving key management standard is gaining traction in the cloud as a way to ensure security across varied infrastructures.
More than two thirds of organizations with sensitive information in the cloud protect it with some kind of encryption before it leaves their hands. Who handles that encryption?
SEM's Optical Media Destroyer can slice and dice up to 2,400 CDs or DVDs an hour, turning them into shards that exceed NSA/CSS standards.
FISMA oversight by the department remains a work in process, and CyberScope has provided only limited help, according to an inspector general's report.
NIST has updated more than 200 pages of security words from federal documents to provide a central resource for definitions of cybersecurity terms.
Automating IT security can be a help in protecting assets and systems, but there are some caveats to keep in mind.
SCAP sets standards to ensure products work together, while Einstein is evolving into an automated tool that will not only detect, but block, malicious code.
The agency has released a draft of a cloud security architecture intended to provide the security needed to speed government adoption of cloud computing.
Shuttle Computer's HR70 biometric scanner can enforce access control through facial recognition, with optional ID card and fingerprint scanners.
A growing number of products can help automate IT security; Nevada's DOT found they can help in other areas, too.
MIT researchers develop a new functional-encryption scheme that could process cloud data while keeping it encrypted.