Given the vast attack surfaces of today's systems, intrusions are nearly inevitable, but they don't have to be catastrophic.
A single portal that offers online services seamlessly would lower costs for states and make transactions easier for the public.
A new report provides a detailed look at just how vulnerable the entire election system is to hacking and urges policymakers to shore up security gaps.
With mobile security technology added to Lockheed's Universal Communications Platform, secure communications networks can be extended to commercial smartphones.
Login.gov is a shared identity authentication solution that lets people use a single sign-on to securely access services from multiple agencies.
Missouri's Office of Cyber Security scans systems of enterprises that operate in the state to find common vulnerabilities.
Managing cryptographic keys and the policies that govern them gets even more complex when the cloud is added to the equation.
Baseline Tailor makes it easier for users to reference the NIST cybersecurity framework to determine the security posture and then tailor a subset of the SP 800-53 security controls to make that desire a reality.
Federal Emergency Management Agency employees can now securely access work email, the intranet and other applications remotely by registering their mobile devices and receiving credentials derived from their FEMA-issued personal identity verification cards.
APE was designed to monitor network traffic on smartphones and block any activity that isn’t playing by the rules, whether it comes from malware, viruses or a hacker.
NASCIO's latest annual survey outlines some of the challenges state IT officials face.
Automated risk management and security compliance software scans the cloud environment for vulnerabilities and threats based on intelligence community standards, overlays, controls and audits.