Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.
New Jersey is the latest state to establish an information-sharing unit, while several other states are trying different tactics.
The framework will help agencies calculate the privacy risk for their IT systems.
According to a recent survey by 2nd Watch, security tools were the most popular third-party purchase for Amazon cloud deployments.
Six nines of uptime is certainly achievable with a little bit of simplification and planning -- and a whole lot of technology and teamwork.
Newly developed password manager software aims to deter hackers by surrounding the real passwords with convincing fakes.
New Microsoft cloud efforts aim to further secure and protect customer data, while increasing transparency about the security.
The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.
Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.
Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.
New studies show just how rapidly the threats are growing -- yet government is still wrestling with basic cyber hygiene.
Five experts offer advice on managing risks when agency employees bring their own mobile devices to work
IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.
Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.