Digital wallet services give customers options to initiate transactions via the Internet or mobile apps without the need to enroll in a system or provide personal information.
Absolute Software Corp.’s Device Freeze Offline Policy lets IT managers set an automated freeze command for any device that remains offline for a specified period of time.
Officials at the Department of Homeland Security have been warning of the consequences to technology programs in the event of a DHS shutdown.
The Box Enterprise Key Management is cloud-enabled content management and collaboration system that gives enterprises full control over encryption keys, while preserving Box user experience.
Because tax fraud is pervasive, governments enlist identity verification technology to ensure refunds go to the correct taxpayer.
The Defense Department released an updated cloud security requirements guide that outlines controls and additional requirements necessary for using cloud-based solutions within DOD.
Recent modifications to IT standards confirm a changing approach to security, interoperability, and performance metrics by the National Institute of Standards and Technology.
The Veterans Affairs Department is gathering information on acquiring a security incident event management service to help it manage the entire VA cybersecurity enterprise.
The president's 2016 budget calls for$14 billion in cybersecurity spending, about a 10 percent increase over 2015 funding.
As agencies prepare to take up the Phase 2 of DHS’s Continuous Diagnostics and Mitigation program, they would do well to replay its initial gap assessment to get the program right.
The Army Research Lab recently posted code for Dshell, its forensic network analysis tool, to GitHub to support the forensic and incident response community.
Buckle up because the Internet of Things is about to take off fast. Here's a quick list of the basics of the new super network.