Watson for Cyber Security will leverage the platform’s natural language processing to provide insight to threats.
Agencies are responsible for three broad areas of compliance: user management, privacy and training.
Establishing the right technology ecosystem can address agencies’ data security challenges, including how and where to store data and control access.
The cybersecurity review examines the DODIN from an adversary’s perspective to better prepare network defenders.
HID Global’s goID platform lets government agencies issue identity credentials over the air to users’ smartphones, from which they can transfer relevant ID data to requestors.
The National Institute of Standards and Technology is calling on the public to help it map out new guidelines for federal agencies' digital authentication practices.
Scams targeting employees during this recent tax season serve as a sobering reminder of the significant security risks workers unknowingly pose to their organizations.
The obstacles are daunting -- money, time, careless users, encryption-resistant legacy systems. But the risks are no less serious.
Most of today’s encryption efforts focus on data stored on servers because that is where the majority of big breaches take place.
Absolute’s Endpoint Data Discovery allows organizations to identify and protect sensitive data stored on endpoint devices outside the enterprise network.
To counter the pace of cyberattacks, the new Air Force Cyber Proving Ground aims to rapidly get cyber tools to operators.
The future of authentication could start with mobile devices and apps that track user location and behavior, DISA Director Lt. Gen. Alan Lynn said.