A panel of chief information security officers discussed how they make employees part of the agency’s cybersecurity defense.
MobileIron Access helps secure cloud data accessed through commonly commercial apps on mobile devices.
A backend attribute exchange streamlines identity management by keeping users' security credentials on local systems but making them accessible from other network locations.
The cloud threat funnel methodology can help agencies uncover the user behavior patterns that lead to legitimate threats.
The city teamed up with Splunk to monitor and analyze its machine-generated data.
The Pentagon has not defined how it will support civilian authorities in the event of cyber attacks, according to a Government Accountability Office report.
NEC's newest biometric fingerprinting device promises faster and more accurate data collection in the field.
Building data secure by default is now technically possible, but a standard must be developed before we’re faced with a stream of fragmented, unsecured data.
White-hat hackers have a chance to try their skills against the Defense Department with the opening of the "Hack the Pentagon" pilot, designed to identify and resolve security vulnerabilities in DOD websites.
Although enterprise security will never be perfect, the NSA lifecycle can give defenders a model for mapping the appropriate mitigation to each step in the intrusion process.
The vulnerability lets attackers use hijacked devices enrolled in mobile device management programs to launch man-in-the-middle attacks, according to Check Point Software.
Automated Indicator Sharing allows industry and government to exchange cybersecurity threat information.