A team of researchers at the Hanscom Air Force Base has developed a process for delivering solutions that protect against insider threats.
Secure browsing topped a list of the most activated mobile applications in the last year, according to a report by enterprise mobile management firm Good Technology.
Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.
While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.
Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.
The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.
Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.
The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.
A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.
The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.