Security, both physical and cyber, traditionally has been outward facing; but in the era of cyberwarfare, new tools are under development against a threat no one can afford to ignore.
As security challenges are addressed, the mobile conversation is moving from technology acquisition and introduction to assimilation into agencies' missions.
The ID card will be targeted to those who do not have a driver's license or other official identification and would allow New Yorkers, regardless of citizenship status, to access basic city services, open bank accounts and lease apartments.
A new software appliance is designed to manage encryption keys and credential files securely in an enterprise data center.
A recent report of a successful pilot of interstate behavioral health data exchange by a coalition of states showed that technical and operational barriers remain before such data can be exchanged nationwide.
ManTech updated its Active Defense endpoint malware protection platform to better streamline detection and incident response.
Already in use among a range of private enterprises and service providers today, Layer 1, 100 gigabit/sec encryption can give government network managers the ability to transport enormous volumes of data in the most secure manner possible.
The Modular Approach to Cloud Security project will build a secure cloud from individual, secure components so that the security of the system as a whole will be derived from the security of its parts.
Wire data analytics uses packet data to monitor activity across the network stack and may be the final step in the development a single monitoring and management architecture for enterprise IT operations.
BlackForest, an open source intelligence gathering system, aims to give cybersecurity teams advance warning of pending attacks.
A study of DDOS attacks over the last three months finds that attackers are using vulnerable servers to launch powerful attacks against government and other targets.
Using Troop ID from ID.me, more than 200,000 military clients are using a single sign-on technique to verify their military affiliation at a number of the company's retail partners.