The Army Research Lab recently posted code for Dshell, its forensic network analysis tool, to GitHub to support the forensic and incident response community.
Buckle up because the Internet of Things is about to take off fast. Here's a quick list of the basics of the new super network.
Bug bounties can increase the breadth – and the effectiveness – of white hat communities.
Microsoft’s new as-a-service operating system will come with a number of built-in security features like multi-factor authentication and containerization.
The Department of Homeland Security and the General Services Administration come up short in tackling cyber risk of access control systems in buildings they manages across the United States.
With its data-driven automation and orchestration, Swimlane manages alerts, increases situational awareness and remediates threats.
The Office of the Director of National Intelligence’s Information Sharing Environment released best practices for data sharing in pursuing national security threats.
Software developers often assume that open source components in their supply chain are reliable – but assumptions like were behind the Heartbleed exploit. Here are ways to lock down your open source projects.
CACI, Appcelerator join forces in developing a tool to help agencies develop and release secure apps on schedule and within budget.
The Cloud Security Alliance survey finds more employees are empowered to use cloud-based applications – without IT department oversight.
2015 is shaping up as a year when data analytics, ubiquitous video, and cyber forensics will force government IT managers to make decisions about how they deploy their resources.
Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.