The Modular Approach to Cloud Security project will build a secure cloud from individual, secure components so that the security of the system as a whole will be derived from the security of its parts.
Wire data analytics uses packet data to monitor activity across the network stack and may be the final step in the development a single monitoring and management architecture for enterprise IT operations.
BlackForest, an open source intelligence gathering system, aims to give cybersecurity teams advance warning of pending attacks.
A study of DDOS attacks over the last three months finds that attackers are using vulnerable servers to launch powerful attacks against government and other targets.
Using Troop ID from ID.me, more than 200,000 military clients are using a single sign-on technique to verify their military affiliation at a number of the company's retail partners.
Government agencies should anticipate the security implications of the Internet of Things and identify how to leverage this revolution for the benefit of all.
Comprehensive adoption of public key cryptography in two-factor authentication has the potential to completely eliminate mass password breaches.
The cost and technical challenge of adding security to complex systems after the fact are prohibitive. Here are some steps developers and managers can take to build security into new software applications.
Government agencies need visibility along the full attack continuum – from point of entry, through propagation and post-infection remediation.
In an annual evaluation of website security by the Online Trust Association, the most heavily trafficked .gov and .mil Web sites generally got poor marks, except for their deployment of DNSSEC.
A cybersecurity exercise by HHS and the health care community produces better security.
Employee IDs cards are incorporating some relatively mature technologies that increase the level of interaction and tracking potential.