Checking for unusual activity in log and event management data can help admins spot the changes that can compromise network security.
The iboss network monitoring console provides packet-level visibility across a network, helping curb conventional and advanced security threats.
PC maker Lenovo and Nok Nok Labs, a developer of online authentication systems, form a partnership to offer a standard approach to improving password security and ease of use.
Agencies should expect to see more authentication, increased use of private clouds and the spread of smart city technologies in 2014.
Madrid, Spain-based AGNITiO sees a place for voice biometrics in authenticating user ID on smartphones and other mobile devices.
AirMagnet’s monitoring solution for wireless networks helps secure communications and tune network performance.
With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.
Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.
Cyber pros from across the military hone their skills against a realistic adversary on a closed network in an 11-day U.S. Cyber Command exercise.
VMware and Palo Alto Networks offer integrated platform to unify network security across both physical and virtual cloud enterprises.
Security Innovation says offering its public key cryptography for use in open-source community would head off a looming ‘cyrptopocalypse’ caused by limited choice of encryption algorithms.
Two of Symantec's public key infrastructure products receive approval for use by federal agencies and contractors.