Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.
The company has released a patch that fixes the flaws that could give hackers access to private information.
A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.
With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.
Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.
Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.
Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.
The Internet is a dangerous place. But there are concrete steps an organization can take to manage the risk while still allowing employees the access they need.
The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.
No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.
Pacemakers and other devices have Internet capabilities, but all too often lack adequate security.
Interest in the DHS-run Continuous Diagnostics and Mitigation program has been slow to build outside of federal agencies, but other levels of government are beginning to take note.