Most government software fails basic security screening, a new report finds. Even worse: government agencies lag far behind other sectors when it comes to fixing flaws once they're found.
The National Institute of Standards and Technology published the final version of its guidance to ensure that sensitive federal information remains confidential even when stored in nonfederal systems.
Between the costs of replacing core systems and the dwindling number of workers qualified to work on them, agencies have few good options.
New specifications add security features to verify identities and work with mobile devices.
Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.
A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.
The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.
While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.
MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.
Google’s vision for mobile authentication takes security out of the hands of humans and puts it into the devices those humans carry.
Gartner's take on what's driving digitization of government services.
Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.