Air-gapped systems, thought to be the most secure because of their isolation, have newly discovered vulnerabilities.
Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.
Suggestions for tech-based solutions for voting and elections may sound practical, but they are certain security hazards.
Public-safety answering points and other 911 service providers need cybersecurity professionals and continuity plans in case of cyber disasters.
With integrated electronic systems, agencies can better control their personnel security.
According to recent reports IBM and Intel – and possibly the Federal Reserve – are considering using the blockchain technology associated with bitcoin to create a new digital payments system.
The Identity of Things creates a single, consistent, panoramic view of a citizen across every department in an organization, reducing the time to roll out new services from years to weeks.
The intelligence community will brief firms on its plans for new insider threat detection and monitoring systems.
BlackBerry announced the SecuTablet, a new secure tablet outfitted with technology components from Samsung, IBM and Secusmart, a German encryption company acquired by BlackBerry last year.
Tech company Galois has developed a secure software solution that makes drones invulnerable to buffer overflow attacks, network sniffing, replay attacks and authentication attacks.
Government network managers do not need removable storage tools; secure managed file transfer systems can get the job done with less risk.
The audit by Cryptography Services will cover a range of security concerns but will focus primarily on the Transport Layer Security stacks, protocol flow, state transitions and memory management.
DARPA’s Brandeis project aims to develop tools with “revolutionary” impact that could help bridge privacy gaps that hamper collaboration and technology development.
With the authorization of HP’s Fortify on Demand service, federal agencies have on-demand access to continuous monitoring and vulnerability detection without additional software.