CyanLine's Fast Disk Acquisition System gives forensics teams a real-time preview of what's on a drive, including whether it's set to prevent copying.
The look-alike Web pages may be created by interest groups, private insurance companies and, sometimes, scammers looking to gather personal information.
The latest revision of FIPS 201, which sets the requirements for PIV cards, includes credentials for mobile devices and new interfaces to enable access with contactless connections.
Public concern over possible tampering by the NSA has led NIST to reopen the comment period on a suite of publications, but the IT security community isn't worried.
If opened to app developers, Apple's Touch ID could give another authentication option to agencies looking to manage mobile devices, especially if other smartphone manufacturers follow suit.
DNSSEC can be an effective tool -- but only one tool -- in preventing redirection attacks such as those carried out recently by the Syrian Electronic Army.
Holding the vendor accountable for results — and right away — is the first step in getting value from your cybersecurity investment, said USPS information security officer Chuck McGann.
Silent Circle releases its latest end-to-end encryption tool, which enables secure texting between Apple iOS and Android platforms. A secure, peer-to-peer email app is due next year.
Prolexic's SSL key-sharing tools make it easier to detect and stop encrypted Layer 7 DDoS attacks while customers maintain control of their SSL keys.
The Postal Service now is using the RedSeal network monitoring platform, originally intended to evaluate firewall rules, to improve situational awareness and operational security across its extended enterprise.
Defending against the steady growth in cyberattacks requires continuous monitoring and automated responses, and that could mean shifting resources.
The proposed profile builds on TCG’s network security architecture to ensure the identity and security status of all devices connecting to a network.