Experian's Tax Return Analysis Platform goes beyond identity verification to offer device-proofing, catching fraud before refunds are processed.
A group of computer scientists at the University of California, San Diego, have developed a tool that lets designers and system builders test embedded hardware security, a first in the field.
The Computer Security Incident Response Center, the centerpiece of HHS's cybersecurity program, helps provide situational awareness across the enterprise and strengthens functional relationships within the health care community that it oversees to help improve security.
Built near the network perimeter, a Science DMZ is a portion of the network optimized for high-performance scientific applications rather than for general-purpose business systems.
The Department of Homeland Security earns top scores in FISMA compliance, thanks in part to the continuous monitoring program built by the department's Office of Inspector General.
Delphix Compliance Engine helps agencies meet changing security and compliance regulations.
Proprietary and open source forensic tools are helping law enforcement extract evidence from mobile devices and even recover data that has been deleted.
Smartphones provide a wealth of evidence for forensics investigators, but the escalating number and variety of mobile devices coupled with a growing case backlog has put digital forensics development to the test.
The demands of security and connectivity are the two major challenges confronting agencies as they roll out mobile networks, government IT executives say.
SafeNet announced a range of high-speed encryption products to help enterprises protect sensitive data as it moves between data centers and across networks.
Government could mitigate identity fraud at local motor vehicle departments by instituting authentication solutions backed by a combination of internal and external databases.
With the final co-located with DEF CON, the Challenge will accelerate development of automated network defense systems and encourage the diverse communities now developing computer and network security to work together in new ways.