New specifications add security features to verify identities and work with mobile devices.
Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.
A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.
The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.
While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.
MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.
Google’s vision for mobile authentication takes security out of the hands of humans and puts it into the devices those humans carry.
Gartner's take on what's driving digitization of government services.
Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.
The "protection," however, comes from using stolen and shared login credentials.
Government agencies running Office 365 can now take advantage of Exchange Online Advanced Threat Protection, a new email filtering service that provides additional protection against malicious attachments and links.
To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.
Is overconfidence by IT security managers a bigger problem than technology challenges?
With the average public sector employee using more than 16 cloud services, a new study finds, the impact of one compromised account can be immense.