DNSSEC can be an effective tool -- but only one tool -- in preventing redirection attacks such as those carried out recently by the Syrian Electronic Army.
Holding the vendor accountable for results — and right away — is the first step in getting value from your cybersecurity investment, said USPS information security officer Chuck McGann.
Silent Circle releases its latest end-to-end encryption tool, which enables secure texting between Apple iOS and Android platforms. A secure, peer-to-peer email app is due next year.
Prolexic's SSL key-sharing tools make it easier to detect and stop encrypted Layer 7 DDoS attacks while customers maintain control of their SSL keys.
The Postal Service now is using the RedSeal network monitoring platform, originally intended to evaluate firewall rules, to improve situational awareness and operational security across its extended enterprise.
Defending against the steady growth in cyberattacks requires continuous monitoring and automated responses, and that could mean shifting resources.
The proposed profile builds on TCG’s network security architecture to ensure the identity and security status of all devices connecting to a network.
Akamai becomes first provider of distributed content and application delivery services to receive authority to operate cloud services under the government’s FedRAMP cloud security program.
Academic environments are built around sharing information, but securing their networks — and the mobile devices that use them — calls for the same layered approach other organizations use.
A sampling of smartphones and tablets by Fiberlink Communications shows government is more likely than other sectors to require strong passcodes for mobile devices.
A video surveillance system that combines thousands of cameras requires more than technology to be effective.
With thousands of cameras providing round-the-clock surveillance of Baltimore, the CitiWatch surveillance program turned to a video analysis platform from VidSys to help make sense of all of the data.