Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.
An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.
Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.
The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.
Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.
Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.
Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.
Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.
In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.