An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.
Researchers have found that they can detect people who are potential cybersecurity risks by reading their neural activity.
Local governments cite the importance of energy systems planning for disaster response.
Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.
An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.
Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.
The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.
Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.
Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.
Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.