Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.
Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.
Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.
In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.
By examining the entire IT infrastructure, security teams can determine how best to assign controls and centralize tasks.
A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.
Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.
The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.
The platform corroborates actual endpoint behavior with third-party data to help capture, analyze and remove malicious activity before it compromises resources.
A new NASCIO study details state governments' struggles to recruit and retain IT talent.