The choice for many agencies is not public or private clouds, but rather a blend of the two approaches – often referred to as a hybrid cloud – where Internet-based applications provide information into a system that sits inside agency firewalls.
Agencies can combat income tax refund fraud with authentication tools that fit into existing evaluation processes.
The presidential directive that mandated the interoperable PIV card for government workers and contactors will be 10 years old this year, but although millions of cards have been issued, their actual usage remains dismally low.
New guidance from NIST for using TLS in government applications requires later versions of the protocol because of vulnerabilities in version 1.0.
NSS Labs study found little difference in the performance of five popular enterprise products designed to protect against socially engineered malware, such as fake system upgrades and anti-virus offers.
Alphaville is part of the Michigan Cyber Range, a network and classroom training environment designed to prepare IT managers on cybersecurity attacks and defenses.
Comments on trustworthiness of cryptographic keys developed with Dual_EC_DRBG causes the standards agency to recommend against its use.
Whether a website was built with new or legacy programming languages, the security risk is about the same, according to a new website security report.
The Snowden and Wikileaks affairs, as well as potential threats from other insiders, has ratcheted up the urgency for a near-real-time analytic approach to government insider workforce risks.
Point solutions to protect the perimeter of the enterprise are not obsolete, but a new generation of tools is arriving to complement them and provide the awareness needed to defend against new complex and targeted threats.
Big data systems can correlate structured and unstructured data to paint a complete picture about an agency’s overall IT health and offer insight into the sophisticated threats.
Entrust IdentityGuard cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing.