The annual conference and expo kicks off Tuesday, tackling the key challenges facing the public-sector IT community.
Decoys assigned to user accounts could tip off admins to attacks born of stolen passwords, Ari Juels and Ron Rivest say.
Despite efforts to use the principles of quantum computing to create unbreakable encryption, the system fails outside a lab or highly controlled setting.
Facility in Richmond, Va., will speed up development and deployment of secure cloud computing services
It runs silent, can turn off its lights and be operated remotely by a technician who doesn't have to join investigators or a covert team in the field.
The updated security controls in NIST SP 800-53 give administrators more flexibility and put a greater focus on IT systems with built-in security.
The first product of the NCCOE is a demonstration of a geolocation scheme to let end users validate that work being done in the cloud is being done in a secure location.
NIST's National Cybersecurity Center of Excellence plans to add a federally funded center to help accelerate adoption of existing cybersecurity technology.
Data Device's new tabletop degaussing machine can destroy the data on a hard drive in 45 seconds.
As denial of service attacks become more frequent and powerful, agencies need to take steps to prepare, from new arrangements with ISPs to establishing low-bandwidth alternate communications.
Servers being bombarded by requests is a nuisance, but when attacks come in conjunction with an emergency, they can lead to trouble.
The drives use scanning technology from ESET and ClevX to check for spyware, Trojans, worms, rootkits and viruses that might otherwise get onto a network.