With its data-driven automation and orchestration, Swimlane manages alerts, increases situational awareness and remediates threats.
The Office of the Director of National Intelligence’s Information Sharing Environment released best practices for data sharing in pursuing national security threats.
Software developers often assume that open source components in their supply chain are reliable – but assumptions like were behind the Heartbleed exploit. Here are ways to lock down your open source projects.
CACI, Appcelerator join forces in developing a tool to help agencies develop and release secure apps on schedule and within budget.
The Cloud Security Alliance survey finds more employees are empowered to use cloud-based applications – without IT department oversight.
2015 is shaping up as a year when data analytics, ubiquitous video, and cyber forensics will force government IT managers to make decisions about how they deploy their resources.
Government mobility managers are racing to stay ahead of the proliferation of mobile devices with strategies that focus on data and applications rather than devices themselves.
No matter how useful antivirus software can be, its drawbacks are causing information security professionals to take a second look at antivirus protection – and the alternatives.
An automated multi-step identity authentication portal aims to cut down on fraud and waste by confirming the identity of clients at the time they are applying for benefits.
The new year will see a convergence of IT security and operations, as agencies spread responsibilities across IT departments and security tools become integrated into software lifecycles earlier .
After the wakeup call from the Sony hack, people inside and outside of government are taking a harder look at protecting their personal information – and vendors are ready with solutions from stylish privacy accessories to secure communications ecosystems.
Before the weather gets frightful – increasing the chances that you may experience significant system downtime – make sure you have a plan in place and follow these best practices.