Records management framework will be based on cloud architecture, secure storage and analytical tools, according to an Office of Management and Budget directive.
The flaw in the ubiquitous programming language is being exploited with the Poison Ivy RAT from servers in China and might not be patched until October.
Researchers for the first time use a solid-state quantum processor in prime factoring (and get it right half the time), which could eventually have a big impact on security.
Of all immigrants coming into the United States, about 825,000 fingerprint records at US-VISIT have multiple names and inconsistent birth dates.
After consolidating its servers CDC's research lab laid the foundation for managing a virtual infrastructure.
Iowa State's Information Assurance Center's test bed simulates complex networks and cyberattacks, making it a trusted source for information on the reliability and effectiveness of security products.
If industrial control systems are running Windows, they're vulnerable to hackers. But can engineers handle that?
As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.
Lack of an overall information security policy has resulted in pervasive weaknesses in the agency's security.
The classified program is looking to develop automated tools for cyber defense and attack.
A pilot project that started in Michigan will give police in in several states access to a database of nearly 13 million mug shots.
Reportedly concerned about unauthorized disclosures, FDA officials installed monitoring software on some scientists’ laptops. The scientists say the action is in retaliation for blowing the whistle.
Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.
Agencies wondering whether to encrypt their data or mobile devices should take note of the trouble encryption is giving security researchers and the worries it gives the Justice Department.
The Inspector General says the consolidated Security Operations Center has improved its security but still has some key vulnerabilities.