Pen-testing, or red-teaming, can be an indispensable tool for discovering and correcting network security weaknesses, but if not done right, things can go terribly wrong.
NIST proposes a model for maintaining and revoking user identities in an increasingly complex online world.
Cyberattack traffic originating in China took a sharp jump in late 2012, according to the latest analysis of activity on Akamai’s global content delivery network.
The Postal Service has been tapped to build a pilot identity credential hub that would simplify secure access for citizens to online government services.
DNS' openness leaves it vulnerable to a variety of denial of service techniques, from brute-force floods to sophisticated recursive attacks.
Most experts agree that you can't do it all by yourself, but there are practical measures agencies can take to shore up their networks against denial of service attacks.
Treating DOS attacks like a man-made disaster can help agencies determine the proper communication and technical response.
Denial of service attacks on the Domain Name System are becoming common, but an effective defense will require a few rule changes.
Brute-force denial of service attacks against networks are still the most common, but hackers are increasingly moving toward more efficient attacks on applications.
The flood of bandwidth in the hands of attackers can overwhelm agency resources, making in-house defense impractical. You need allies outside your network.
As DOD moves into cloud computing, pilots and projects look to assess risk and develop multiple layers of network defense.
Lax security could soon threaten the gains agencies have made by letting employees use their own mobile devices for work, a new study says. There are basic protective steps agencies can take now.