Agencies that focus on a governance-based identity and access management strategy can protect against the full range of identity-centered attacks.
During a recent panel discussion, Pentagon officials pushed back on criticisms that there is lack of clarity on how the Defense Department will respond to domestic cyberattacks.
A new survey shows a significant decline over the past two years in federal employees’ trust in their agency’s ability to protect information systems.
Integrating automation into network defenses will become increasingly important as threats become more sophisticated and diverse.
The mBeaconCard identity card enables wireless tracking and contactless applications, such as access control, payments processing and workforce analytics.
Celebrating discovery and innovation in government IT.
A bill in New York calls for a device that can field-test electronic devices after an accident for proof of their unlawful use while driving.
The Compliance Masonry platform lets users actively interact, update and generate assurance reports for any type of risk management framework.
A new report finds that government agencies at all levels ranked dead last in cybersecurity against major private industries.
Rep. Will Hurd (R-Texas) says a reorganized "cyber infrastructure protection" division could serve as a valuable resource and central point of contact.
Inconsistent application of agencywide security controls puts taxpayer information at risk, the Government Accountability Office said.
A panel of chief information security officers discussed how they make employees part of the agency’s cybersecurity defense.