How you categorize your data is key to being able to compare and contrast what you collect and, ultimately, make better decisions.
With almost half of Android users carrying devices running out-of-date operating systems, the Homeland Security Department warned users they are playing with fire.
Architects must show how their system designs operate in the field as agencies tackle big data, cloud and mobility issues.
Guidance for providing role-based training to those with cybersecurity responsibilities is being updated to reflect growth in socially engineered threats.
Free services such as Twitter and Facebook are an easy way to expand your online presence, but agencies still must address the risks.
The StarChase system includes an air launcher in the grill of a cruiser and sticky GPS devices that attach to a vehicle so it can be tracked.
A report on a recent survey showing the disconnect between users and IT staff members on security prompted readers to offer some advice.
NIST has begun a formal review of its processes for developing cryptographic standards in the wake of reports that the NSA, its partner in crypto development, inserted a backdoor into specs for generating crypto keys.
Three months after shuttering their respective encrypted email services, Silent Circle and Lavabit announced an industry coalition to develop an open-source protocol for truly secure email.
BlueLine, created by William Bratton, is a closed social media platform for law enforcement that lets officers interact and share best practices.