Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.
The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.
A new report draws parallels to the battles over security and encryption between the government and privacy advocates in the 1990s to the current struggle in the wake of the Snowden releases.
The Internal Revenue Services has joined forces with state government and industry groups to strengthen taxpayer authentication and protect identity.
Most government software fails basic security screening, a new report finds. Even worse: government agencies lag far behind other sectors when it comes to fixing flaws once they're found.
The National Institute of Standards and Technology published the final version of its guidance to ensure that sensitive federal information remains confidential even when stored in nonfederal systems.
New specifications add security features to verify identities and work with mobile devices.
Agencies can gain valuable insight on the logistics of the Continuous Diagnostics and Mitigation program from the Department of Homeland Security’s experience with Phase I implementation.
The Defense Media Activity is looking for help in removing personal identifiable information from video content created between 1995 and 2011.
A hand-held biometric device would help agents who encounter a suspect in the field who either has no identification or who tries to mask his identity.
While Congress hashes out a federal standard for data breach notifications, many states are toughening their own reporting laws.
MyID Trusted Authenticator gives Good Technology customers access to a wide range of secure credentials for signing, authentication and encryption.