In launching shared services, agencies find ways to build awareness of their offerings and to overcome misunderstanding about the cloud.
Belkin's DisplayPort Secure KVM locks down sound and video channels, ensuring that no data can cross networks.
Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.
GuardedID, which defends against keylogging and other snooping malware, is being released for mobile devices as a software developers' kit.
Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.
Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.
A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.
The ZBook 15 is a powerful workstation in every way except size and shape.