The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.
The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.
Following recent cyber breaches, U.S. CIO Tony Scott ordered a cybersecurity sprint to rapidly evaluate problem areas. As that 30-day dash comes to a close, experts weigh in on the likely outcomes.
The Department of Homeland Security expands its FedVTE program, giving state, local, tribal and territorial government employees free access to cybersecurity training.
US-CERT warns feds to look carefully before clicking on those emails about identity-protection services.
No one denies that John Hancock signed the Declaration of Independence. An e-signature should provide same irrefutable verification for centuries to come.
Because supervisory control and data acquisition systems manage critical infrastructure, acceptance of risks in cloud-based SCADA system controls should approach zero.
The Army is continuing with updates to its cryptographic devices as part of the Army-Wide Cryptographic Network Standardization.
A new report draws parallels to the battles over security and encryption between the government and privacy advocates in the 1990s to the current struggle in the wake of the Snowden releases.
The Internal Revenue Services has joined forces with state government and industry groups to strengthen taxpayer authentication and protect identity.
Most government software fails basic security screening, a new report finds. Even worse: government agencies lag far behind other sectors when it comes to fixing flaws once they're found.