Rather than trying to keep up with and get ahead of malicious software, hardware security can help ensure that devices are safe and remain uninfected, says Imation's Larry Hamid.
The service's industrial controls get smarter during its quest for "net zero" buildings, which brings cybersecurity into play.
Although malware can evade signatures and other filters, its code leaves telltale tracks that can be discovered through traffic analysis, analysts show in FOSE demonstration.
SAFECode, an industry group promoting reliability in commercial software, is releasing a free online training course on the basics secure software development.
The open access policies at educational institutions can leave them open to being exploited as bots in large-scale distributed denial of service attacks. There are steps they can take to mitigate the problem.
Deployment of the governmentwide intrusion detection system was scheduled to be completed last year, but there still are a "bunch of agencies not covered."
The annual conference and expo kicks off Tuesday, tackling the key challenges facing the public-sector IT community.
Decoys assigned to user accounts could tip off admins to attacks born of stolen passwords, Ari Juels and Ron Rivest say.
Despite efforts to use the principles of quantum computing to create unbreakable encryption, the system fails outside a lab or highly controlled setting.
Facility in Richmond, Va., will speed up development and deployment of secure cloud computing services
It runs silent, can turn off its lights and be operated remotely by a technician who doesn't have to join investigators or a covert team in the field.
The updated security controls in NIST SP 800-53 give administrators more flexibility and put a greater focus on IT systems with built-in security.