Interoperability standards will create a world of interconnected clouds fraught with opportunities and security risks, experts say.
During the first 40 years of the Internet, security has been about patching mistakes; the future will be about creating an environment that is secure by design and protected by big data.
Kingston's DataTraveler 4000 drive, with ESET's ClevX DriveSecurity, keeps data and networks safe without significantly slowing down transfer times.
The growth in cyberattacks and the theft of intellectual property has prompted calls for more aggressive cyber defense. The Pentagon and an independent commission are taking up the cause.
The software supports CAC and PIV card authentication, and meets NSA and DISA requirements for secure Bluetooth communication.
What agencies can do to manage the risks of using consumer cloud accounts such as iCloud, Evernote and Dropbox to store and access business data.
Florida's Department of Children and Families is using LexisNexis Risk Solutions, which creates a profile based on customer-supplied information, to authenticate people applying for public assistance.
A new app works with the cards on iOS and Android platforms, as will future versions of BlackBerry 10.
AWS gets approval to offer cloud services under the Federal Risk and Authorization Management Program, which agencies use to assess the risks of cloud services.
Comments on a NIST request about developing a cybersecurity framework for protecting critical energy, utilities and information systems show where work needs to be done.
Cybersecurity must become a full partner with IT and get more aggressive in searching out threats in order to effectively fulfill its mission of supporting agency missions.
Rather than trying to keep up with and get ahead of malicious software, hardware security can help ensure that devices are safe and remain uninfected, says Imation's Larry Hamid.