Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”
Authentic8's Silo is now configured with DOD's public certificates, allowing for secure authentication of Common Access Card users.
After six months of conversations with firearms companies, experts and law enforcement, the Department of Justice issued specifications for law enforcement smart guns.
Agencies must be ready to protect sensitive government data from the potentially devastating hacking threats that loom just beyond the horizon.
The distributed ledger technology may be able to manage and secure health information that flows back and forth among patients, doctors, insurance companies and federal agencies.
Rep. Will Hurd (R-Texas) says filling the federal CIO and CISO positions will be big first steps toward ensuring cybersecurity.
Allegations against contactor Harold Martin are a critical reminder that protecting against insider threats requires more than employee awareness.
If industry fails to self regulate in light of security challenges facing IoT devices, the government could be forced to step in.
Special Publication 800-160 urges organizations to address security throughout the systems engineering process.
A well-run program offers agencies a way to extend their penetration testing and network monitoring programs.
The Federal Automated Vehicles Policy provides a framework to improve roadway safety and provide direction for the next administration.
Following the Pentagon’s successful bug bounty program, the Army has announced its own "Hack the Army" program to tighten up security on its public-facing websites.