The Unisys Stealth security software solution is close to approval for NSA’s Commercial Solutions for Classified Program Components List -- clearing the way for use on classified networks.
A survey of federal IT managers shows the biggest cybersecurity challenges agencies face.
Whether the card allows for access into a government building or another country, new technologies are making it easier for officials to verify identities.
Lewis Rhodes Labs has a neuromorphic processor that increases the speed and resolution of anomaly detection by more than 100-fold
According to recent budget documents, the Navy is asking for $88 million in research and development associated with cyber resiliency.
The research agency underwrites a project to help document a system's effectiveness at protecting user data.
A new study finds that public sector organizations in the United States are targets in a vast majority of attacks.
Peripherals that use unencrypted radio signals to communicate can create vulnerabilities for enterprises.
According to DOD Deputy CIO Richard Hale, the department is seeking to weave cybersecurity duties into virtually every job description.
Overlooking or underestimating issues in business continuity planning can add insult to injury when disaster finally occurs.
If the county-owned phone used by San Bernadino shooter Syed Farook had been enrolled in the agency’s mobile device management program, the FBI-Apple standoff might have been moot.
While most cybersecurity strategies primarily address limiting the possibility of attack, organizations must assume their systems will be compromised and deploy a strategy to isolate and collapse affected network cells.