Forensic Toolkit 5.1 adds native investigative capability for Microsoft's Volume Shadow Copy and geolocation technologies
Dell Software recently announced new tools for mobility management, security and business intelligence.
Standardized SDP security framework will protect application infrastructures from network-based attacks.
New service brings increased security and access management for both employee-owned and corporate-issued devices.
Checking for unusual activity in log and event management data can help admins spot the changes that can compromise network security.
The iboss network monitoring console provides packet-level visibility across a network, helping curb conventional and advanced security threats.
PC maker Lenovo and Nok Nok Labs, a developer of online authentication systems, form a partnership to offer a standard approach to improving password security and ease of use.
Agencies should expect to see more authentication, increased use of private clouds and the spread of smart city technologies in 2014.
Madrid, Spain-based AGNITiO sees a place for voice biometrics in authenticating user ID on smartphones and other mobile devices.
AirMagnet’s monitoring solution for wireless networks helps secure communications and tune network performance.
With advances in research on new token-based and biometric identification systems, it's time for the government to bid adieu to the common password.
Public-sector cybersecurity experts predict that threats will not change dramatically in 2014 but will seek new platforms, including bring your own cloud, the Internet of Things and wearable computing.