Digital identity management technology allows devices to securely recognize and interact with each other, improving the quality of civic services and city planning.
A panel of cybersecurity experts explore the lessons learned from the breach and how Defense agencies can best defend their networks.
The new components of Unisys Stealth are based on a software design that eliminates operational costs associated with additional hardware and cuts deployment times by up to half.
Two more examples -- from Boston and the Transportation Security Administration -- of how one misstep can compromise an entire system.
Lack of awareness about context-aware security was the top barrier to implementation and adoption, according to a recent survey.
The department's Science and Technology Directorate has licensed the PathScan network anomaly detection tool to Ernst & Young.
The State Department is looking for a set of how-to guides for handling, blocking and responding to cyberattacks.
Virginia Gov. Terry McAuliffe wants his IT team to conduct a full cybersecurity audit and craft new strategies for preventing attacks on state networks.
After establishing a baseline level of trust, subsequent decisions regarding access should factor in the context of that decision and the value of the resource being requested.
A recent study offered 10 recommendations for bolstering cybersecurity of commonly used embedded systems.
A new study details which Top-Level Domains are saturated with suspicious websites.
The agency's Bureau of Reclamation announced a one-year limited-source award to Microsoft reseller New Tech to support 100 licenses of Windows Server 2003.