Agencies can identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.
Although the information that is lifted from government or corporate networks by criminals is a hot commodity on the dark web, tools are being developed to help officials track their stolen data.
Knowing more about organized cybercriminals and the malware marketplace can help IT managers better defend the enterprise, Kaspersky Lab says.
Frequent, mandatory password changes are not only unnecessary but may in fact be harmful to security, according to studies on the subject.
Instead of looking for the technical attributes of known malware and other exploits, IT managers can quickly and accurately detect active attackers by the things they must do on an unfamiliar network to accomplish their objective.
Migrating to the stronger encryption now will ensure agencies that process credit card payments can continue to conduct business, serve taxpayers and bring in revenue.
Gen. Michael Hayden, the former director of the National Security Agency and CIA, said the nation has hardly begun the cybersecurity conversation about what should be open and what should be protected.
Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.
Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.
Celebrating discovery and innovation in government IT.
Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.
As experts warn of the threats posed by outdated federal technology, lawmakers inch closer to backing a $3.1 billion fix-it fund.