Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
The StarChase system includes an air launcher in the grill of a cruiser and sticky GPS devices that attach to a vehicle so it can be tracked.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.
BlueLine, created by William Bratton, is a closed social media platform for law enforcement that lets officers interact and share best practices.
The 8- and 10-inch tablets can be used in three modes and boast 18-hour battery life.
Text analytics is more than just sentiment analysis. It is being used to enable churn analysis, fraud detection, risk analysis, warranty analysis, medical research and other nontraditional use cases.
The past month of problems and de-bugging on the Affordable Care Act portal has not been so bad, if you think of it as a beta.