Although most widely known as a feature in consumer products, GPS timing and positioning is used in much of the nation's critical infrastructure, from managing air traffic to time-stamping financial transactions.
It's the only security standardization game in town for feds, and it will mature. Meanwhile, IBM gets FedRAMP stamp of approval.
In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.
Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.
Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.
GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.
Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.
Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.