Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.
Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.
Celebrating discovery and innovation in government IT.
Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.
As experts warn of the threats posed by outdated federal technology, lawmakers inch closer to backing a $3.1 billion fix-it fund.
A new report explores the potential ways the technology behind Bitcoin could help USPS reinvent its mission.
State officials tell Congress on how they are preparing for (and responding to) cyberattacks.
Naval Air Systems Command issued a broad agency announcement for research to ensure weapon systems can survive and exploit cyber warfare.
Agencies are mining data to fight fraud, but the criminals may have better algorithms.
By including security in all aspects of development and operations processes, agencies can move from a reactive to a proactive security posture.
While the threats facing emergency response systems depend on what type of infrastructure jurisdictions possess, officials can take steps to protect their networks.
A recent panel focused on government’s role in managing the risks associated with the Internet of Things.