Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.
The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.
A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.
While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.
MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.
Google’s vision for mobile authentication takes security out of the hands of humans and puts it into the devices those humans carry.
Gartner's take on what's driving digitization of government services.
Encryption ensures that only the intended recipients of a government email would be able to open and read the content and its attachments -- a necessary requirement in health care, education and law enforcement.
The "protection," however, comes from using stolen and shared login credentials.
Government agencies running Office 365 can now take advantage of Exchange Online Advanced Threat Protection, a new email filtering service that provides additional protection against malicious attachments and links.
To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.
Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.