Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.
Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.
In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.
By examining the entire IT infrastructure, security teams can determine how best to assign controls and centralize tasks.
A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.
Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.
The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.
The platform corroborates actual endpoint behavior with third-party data to help capture, analyze and remove malicious activity before it compromises resources.
A new NASCIO study details state governments' struggles to recruit and retain IT talent.
The iboss FireSphere Threat Isolator integrates the company’s advanced persistent threat solution with HP’s software-defined networking architecture.
Security researchers say they’ve uncovered a new technique for stealing login credentials from any Windows device, but Microsoft says it addressed the issue in 2009.
According to a recent RFI, the Army will be ending its support contract with Microsoft but wants to ensure it can still avoid security vulnerabilities on its 8,000 Microsoft Windows XP devices.