Growing resources and increasing attention being paid to continuous monitoring could help agencies consolidate last year's gains in FISMA performance.
While the private sector is winding down its use of the decades-old algorithm in their products, government is still grinding out SHA-1 certificates.
It’s not a competition, but neither provides completely secure or effective access control on its own. What is needed is an appropriate combination of technologies.
Secure Socket Layer-based encryption remains vulnerable to attack despite promising efforts to tighten management of the humble but critical security protocol.
Recent hacks of celebrity data that had been saved to the cloud illustrate the need to be aware of what your mobile devices – agency-issued or BYOD – are doing and where the data is going.
Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.