NIST is considering Format-Preserving Encryption schemes that could let agencies keep data hidden while in transit or in use by an application.
Forget 2013; that's old news already. Researchers at the security company Internet Identity are looking ahead to 2014, and what they see isn't pretty.
As defenses get better and the bad guys get more creative, the threats will become more complex and the risks greater in the coming year.
The National Strategy for Trusted Identities in Cyberspace is considering commercial cloud services for authenticating third-party credentials of users accessing government websites.
Software being developed by Optio Labs would control data access and app use depending on location, time of day, other apps in use and even who you’re with.
Groups will run a variety of pilots for trusted identities covering areas ranging from first-responder authentication and secure business transactions to the exchange of health care information.
With threats on the rise and skills at a premium, how do cybersecurity personnel close the technology and resource gaps?
NSTIC is funding five pilot programs that mark a major step toward creating a digital identity ecosystem to enable greater online transactions by government and the private sector.
With an eye toward protecting patient privacy, HHS offers tools for keeping health data protected on mobile devices -- advice that any public-sector agency could follow.
Good Technology's product fits over an iPhone 4 or 4s and contains a smart-card or microSD reader for two-factor authentication.
A list of information security terms from federal documents is being updated by NIST to provide a central resource of common terms and definitions.
The all-too-easy hack of South Carolina's Department of Revenue could have been prevented by a dual-password system. How does it work?