Innovative security, a friendly (for real) cross-platform interface, and handy support for telework and BYOD could do a lot for public-sector organizations
Using NIST's Security Content Automation Protocol in tandem with TCG's Trusted Network Connect architecture provides the benefits of two open standards to improve endpoint security.
The government has specified a series of vetted cryptographic algorithms that can be used to verify the authenticity of documents and digital signatures. Here's how they do it.
The winner of the five-year competition -- called Keccak -- will be a candidate for the new federal SHA-3 standard, but NIST scientists say it is not a replacement for SHA-2, which has held up better than expected.
For agencies that need secure voice over IP communications, Belkin has introduced a switch that offers certralized control over audio ports.
A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?
Groovy, a subset of Java, is so easy to work with it, it could one day replace the ubiquitous programming language.
A new report from FireEye details the dominant current trend in phishing, and the most common words and file attachments used in malicious e-mails.
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.
DOE is using a cloud-based appliance to handle encryption of unclassified e-mail, but the solution is not for everybody.
Although PIV cards are intended to be a standard source for PKI certificates, legacy hardware and software and the emergence of mobile devices have led DOE to adopt a gateway encryption appliance for secure e-mail.