ACT-IAC assembled recommendations from industry, government and academia on ways agencies can reinforce their cybersecurity programs.
Army researchers are working on an algorithm that will help system administrators improve security by more easily identifying malware authors and tracking the origin of threats
To address the challenges inherent in password-based security, the U.K. government is taking a different tack -- encouraging its systems administrators to simplify their approach to passwords and use automated controls.
The Defense Department will no long accept the driver’s licenses or state-issued identification from Illinois, Minnesota, Missouri, New Mexico, Washington and American Samoa for entrance to its facilities.
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.
The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.
The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.
Galois has been awarded a $1.7 million contract from the Department of Homeland Security for a peer-to-peer collaboration technology that allows organizations to work together to detect and mitigate distributed denial of service attacks.
Officials from the Defense Information Systems Agency discussed the capabilities it requires for network security.
Attacks on the domain name systems are on the rise and can cripple an agency’s network.
Juniper Networks responded to the finding of “unauthorized code” in its firewall operating system with a complete replacement of its original controversial random number generator, Dual_EC.
The federal government is backing off its demand that states bring their driver’s licenses and state ID cards to federal standards or see their residents face greater hassles at airports.