The Environmental Protection signs contracts that will help meet its goal of having 80 percent of its computing in the cloud by 2015.
The government efforts to secure the nation’s electric grid from cyberattack are hampered by a cumbersome regulatory system and inadequate enforcement, a Senate panel is told.
NIST proposed new options for using iris recognition as an alternative to fingerprints in federal Personal Identity Verification.
In order to manage your mobile risk portfolio, agencies should start an analysis of mobile demand across different employee segments.
As a N.C. state legislator found out the hard way, errors caused by workplace fatigue can have decisive and sometimes irreversible results.
Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.
As more of our life moves online we still are looking for an identity management scheme that is practical, secure and scalable. Don't hold your breath.
The theft of Yahoo passwords, including those of government users, highlights the problem with weak authentication. But it doesn’t have to be that way.
SAS Security Intelligence platform uses a common infrastructure to detect and prevent threats across government agencies and industry.
Proposed changes in FIPS 201 reflect changes in the technology and environment in which the federal PIV cards for government workers and contractors are used.
The patch for the XML Core Services flaw doesn't yet cover every version, but it does cover the version being attacked.
NIST's revised guidance sharpens the focus of the original publication, released in 2008, excluding laptops and low-end cell phones, and covering both enterprise-issued devices and BYOD.
The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.
Bad weather in the past year has done what terrorists haven’t managed – disrupt power for a week or more at a time. Officials say Smart Grid technology could ease the pain.
Trojan apps are the primary means of infecting mobile devices; the good news is that you can prevent installation of malicious apps on your device.