Unisys upgrades Stealth with software-based security

Unisys upgrades Stealth with software-based security

The new components of Unisys Stealth are based on a software design that eliminates operational costs associated with additional hardware and cuts deployment times by up to half.

Systems security gone wrong

Systems security gone wrong

Two more examples -- from Boston and the Transportation Security Administration -- of how one misstep can compromise an entire system.

Making the case for context-aware security

Making the case for context-aware security

Lack of awareness about context-aware security was the top barrier to implementation and adoption, according to a recent survey.

DHS moves another security technology to the commercial market

DHS moves another security technology to the commercial market

The department's Science and Technology Directorate has licensed the PathScan network anomaly detection tool to Ernst & Young.

state department seeks cybersecurity playbook

State seeks playbooks to boost its cyber game

The State Department is looking for a set of how-to guides for handling, blocking and responding to cyberattacks.

Virginia to get a full cybersecurity review

Virginia to get a full cybersecurity review

Virginia Gov. Terry McAuliffe wants his IT team to conduct a full cybersecurity audit and craft new strategies for preventing attacks on state networks.

How to limit cyber risk with adaptive authentication

How to limit cyber risk with adaptive authentication

After establishing a baseline level of trust, subsequent decisions regarding access should factor in the context of that decision and the value of the resource being requested.

Air Force outlines initial steps to protect embedded systems

Air Force outlines initial steps to protect embedded systems

A recent study offered 10 recommendations for bolstering cybersecurity of commonly used embedded systems.

Concerned about cyber hygiene? Steer clear of .zip domain

Concerned about cyber hygiene? Steer clear of unfamiliar domains

A new study details which Top-Level Domains are saturated with suspicious websites.

Interior signs up for Windows Server 2003 support

Interior signs up for Windows Server 2003 support

The agency's Bureau of Reclamation announced a one-year limited-source award to Microsoft reseller New Tech to support 100 licenses of Windows Server 2003.

DHS outlines biometric future

DHS outlines biometric future

The Department of Homeland Security released its vision for how enhanced biometrics capabilities will transform the agency’s operations over the next 10 years.

Iowa testing digital driver’s licenses

Iowa testing digital driver’s licenses

The state's Department of Transportation is testing mobile driver license software with employees who will assess and validate the solution.