IT Security

FAQ: How to pick a secure cloud provider

There are several essential questions to consider in picking a cloud provider, including what level of security is needed for services your agency is moving

3 simple tricks for defeating hackers on the road

In certain places, traveling feds can almost count on an attempt to steal information from their laptops. Here are ways to give them the old Willy Wonka.

Microsoft to release 2 'important' patches Tuesday

Bulletins coming on Sept. 11 Patch Tuesday will include fixes for developer tools and server software.

Are security-savvy execs wary of the cloud?

Organizations with strong security practices are more likely to entrust their data to cloud providers, according to a recent survey by the Ponemon Institute.

Scrap the app: Smart-phone users getting wary over privacy

People are starting to get suspicious about what apps take from them, and are declining to download, a Pew study shows.

CipherCloud encrypts data across multiple cloud apps

Connect AnyApp encrypts data in transit, in use and at rest for Web applications and services such as, Gmail, Office 365 and Amazon Web Services.

Dem, GOP platforms expose divide over cyber defense

Acknowledging Congress' failure to pass cybersecurity legislation, Democrats assert the president’s willingness to act on his own through executive order.

FBI, Apple leave users vulnerable after alleged AntiSec hack

With millions wondering if their device identifiers are included in the reported breach of FBI files, the FBI and Apple clam up, leaving users vulnerable to scammers offering to fill the information void.

Zero-day Java exploit shows how fast hackers have become

Recent attacks illustrate the growing professionalism of malware developers, analyst says.

Magic log-in ring lets you use finger swipes for passwords

Researchers at Rutgers have developed a prototype device that lets you authenticate with the swipe of a finger.

Navigating the 'unholy' matrimony of mobile and cloud

Mobile computing and the cloud, which each have their own security concerns, have become inseparable.

AI surveillance cameras can learn, remember ... and forget

The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.

Time to give up on Java?

The zero-day window for the latest Java vulnerability has officially closed, but agencies still have to decide whether the benefits of running Java on their computers outweigh the risks.

Chip encrypts Android calls, without the lag time

TrustCall system can turn almost any Android phone into a secure communication device.

Oracle issues patch for Java flaws; attacks tied to Nitro gang

The rare out-of-band update closes holes being exploited in attacks, at least some of which are coming from China.

More from 1105 Public Sector Media Group