Government agencies should anticipate the security implications of the Internet of Things and identify how to leverage this revolution for the benefit of all.
Comprehensive adoption of public key cryptography in two-factor authentication has the potential to completely eliminate mass password breaches.
The cost and technical challenge of adding security to complex systems after the fact are prohibitive. Here are some steps developers and managers can take to build security into new software applications.
Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.
In an annual evaluation of website security by the Online Trust Association, the most heavily trafficked .gov and .mil Web sites generally got poor marks, except for their deployment of DNSSEC.
A cybersecurity exercise by HHS and the health care community produces better security.
Employee IDs cards are incorporating some relatively mature technologies that increase the level of interaction and tracking potential.
Experian's Tax Return Analysis Platform goes beyond identity verification to offer device-proofing, catching fraud before refunds are processed.
A group of computer scientists at the University of California, San Diego, have developed a tool that lets designers and system builders test embedded hardware security, a first in the field.
The Computer Security Incident Response Center, the centerpiece of HHS's cybersecurity program, helps provide situational awareness across the enterprise and strengthens functional relationships within the health care community that it oversees to help improve security.
Built near the network perimeter, a Science DMZ is a portion of the network optimized for high-performance scientific applications rather than for general-purpose business systems.
The Department of Homeland Security earns top scores in FISMA compliance, thanks in part to the continuous monitoring program built by the department's Office of Inspector General.