The Defense Department is exploring ways to build on the success of the Common Access Card by extending identity management to mobile devices.
The Citizenship and Immigration Services has enhanced the Homeland Security Department's E-Verify system by using analytics to flag and 'lock' Social Security Numbers that have been used fraudulently.
A Microsoft research paper describes the unconventional approach that could double data center efficiency.
The number of D.C. government workers using wireless messaging support from Good Technology has grown from 300 to 2,250 in the last three years, according to the firm.
A Cyber Security Research Alliance report lays out a logical road map for designing security into often attacked cyber-physical systems.
The agency intends to use the data collected for an online interactive map that will detail each data provider’s network performance.
Websense Security Labs released its cybersecurity predictions for 2014, suggesting areas IT managers should monitor.
The Federal Aviation Administration released its plan for drone integration into civilian airspace.
The vulnerability in all supported versions of Windows has been exploited in watering hole attacks against targeted victims.
In addition to established policies on use, agencies can take these basic steps to help avoid breaches and malware.