Five experts offer advice on managing risks when agency employees bring their own mobile devices to work
Defense Department mobile users will now be able to make classified voice, video and data calls and access SIPRNet through the Internet with the DOD Enterprise Classified Travel Kit Gateways.
IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.
An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.
Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.
An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.
Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.
Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.
The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.
Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.