IT managers should get in shape for the Windows 10 update relay by installing updates more frequently, the company advises.
An open source, software-defined perimeter being developed by the Cloud Security Alliance and Waverley Labs aims to stop distributed denial of service attacks dead in their tracks and enable highly secure cloud-based applications.
Federal information security experts warn that IoT technology is advancing faster than the policies to guide it.
An irresistible price tag on a security camera can come with hidden costs -- some of which could impact the security of your government facility.
Following a secure standard is critical to eliminating the easy vectors hackers use to launch attacks.
Facing recruitment, retention and retirement hurdles, states are finding creative solutions to attract and keep cybersecurity talent.
The proposed Threat Intelligence Platform would foster greater analysis and information sharing in cyber investigations.
Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.
Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.
Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.