how facial recognition technology works

A closer look at facial recognition

Facial recognition is emerging as an authentication method more accurate than passwords – but how do these systems work?

USMobile

NSA-grade encryption for mobile over untrusted networks

The Scrambl3 app creates a secure virtual-private network that connects BYOD smartphones to an agency server to send messages with end-to-end encryption.

NIST issues SHA-3 cryptographic hash standard

NIST issues SHA-3 cryptographic hash standard

NIST calls the new standard, which is based on an instance of the KECCAK algorithm, “a next-generation tool for securing the integrity of electronic information.”

Using a private cloud for healthcare data

How to secure a private cloud for health care data

When considering a private cloud in health care, be sure to conduct ample research, develop a solid risk management policy and ensure that business objectives are met.

DISA updates draft cloud security guidelines

DISA updates draft cloud security guidelines

The Defense Information Systems Agency recently released a new draft of security standards as the Defense Department moves to a cloud environment.

7 cybersecurity questions to expect after the OPM breach

7 cybersecurity questions to expect after the OPM breach

To ensure your organization is not next in the limelight for all the wrong reasons, the answers to these questions better be the right ones.

How to leverage networks to boost security

How to leverage networks to boost security

By optimizing network performance, IT managers can implement automated, proactive security strategies that will increase network stability and improve the security of the agency.

Software automates DISA STIG audits

Portable software automates DISA STIG audits

SecureVue Auditor License offers a portable software solution for Defense Department IT network audits.

DOD approves derived credentials on BlackBerrys

DOD approves derived credentials on BlackBerrys

The Department of Defense has recently approved derived public key infrastructure credentials on BlackBerry devices.

Firm builds Adversary Pursuit Center for remote cyber services

Firm builds Adversary Pursuit Center for remote cyber services

root9B will open a $2 million cybersecurity center to provide remote security services to the company’s government and commercial clients.

mitigate the damage from DDoS attacks

How to minimize the impact from DDoS attacks

While government agencies will always be targets of distributed denial-of-service attacks, they can make themselves less appealing to hackers.