Six nines of uptime is certainly achievable with a little bit of simplification and planning -- and a whole lot of technology and teamwork.
According to a recent survey by 2nd Watch, security tools were the most popular third-party purchase for Amazon cloud deployments.
Newly developed password manager software aims to deter hackers by surrounding the real passwords with convincing fakes.
New Microsoft cloud efforts aim to further secure and protect customer data, while increasing transparency about the security.
The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.
Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.
Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.
Five experts offer advice on managing risks when agency employees bring their own mobile devices to work
Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.
IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.
An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.
Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.