To thwart password theft, the devil is in the decoys

To thwart password theft, the devil is in the decoys

Newly developed password manager software aims to deter hackers by surrounding the real passwords with convincing fakes.

A cloud lockbox to keep data secure

A cloud lockbox to keep data secure

New Microsoft cloud efforts aim to further secure and protect customer data, while increasing transparency about the security.

Is swipe technology the future of authentication?

Is swipe technology the future of authentication?

The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.

VA security holding in face of mounting threats

VA security holding in face of mounting threats

Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.

What keeps federal CISOs awake at night

What keeps federal CISOs awake at night

Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.

The insider threat in employees’ pockets

The insider threat in employees’ pockets

Five experts offer advice on managing risks when agency employees bring their own mobile devices to work

DOD Enterprise Classified Travel Kit Gateways

DISA comm kits offer secure mobile access

Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.

Microsoft says start practicing now for Windows 10 update cycle

Microsoft says start practicing now for Windows 10 update cycle

IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.

black cloud software defined perimeter

‘Black Cloud’ darkens the enterprise to all but authorized devices

An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.

IoT: Is tech the easy part?

Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.

The hidden costs of “low-cost” surveillance cameras

The hidden costs of “low-cost” surveillance cameras

An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.

Beyond compliance: DISA STIGs’ role in cybersecurity

Beyond compliance: DISA STIGs’ role in cybersecurity

Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.


More from 1105 Public Sector Media Group