Using NIST's Security Content Automation Protocol in tandem with TCG's Trusted Network Connect architecture provides the benefits of two open standards to improve endpoint security.
Microsoft has reached a settlement with the operators of the 3322.org domain in China to “sinkhole” traffic to 70,000 malicious subdomains.
The zero-day window for the latest Java vulnerability has officially closed, but agencies still have to decide whether the benefits of running Java on their computers outweigh the risks.
As the bad guys turn their attention to mobile devices, the government has begun mapping out security that needs to be incorporated in coming generations of this technology.
A survey of government officials indicates that it is cost savings — not politics — that drives technology purchasing.
Some political campaign apps are a lot like politicians; they seem to be more interested in what they can collect than what they deliver.
Discovery of the state-sponsored (wink, wink) Gauss malware proves once again that, in cyberspace, nothing stays secret for long.
Despite the growth of advanced threats, there's still plenty of old-school, low-imagination spam going around.
Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.
It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.
A compromise version of Cybersecurity Act of 2012 backs continuous monitoring of government IT security over regulatory compliance in the Federal Information Security Management Act.
As more of our life moves online we still are looking for an identity management scheme that is practical, secure and scalable. Don't hold your breath.
Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.
Thomas Edison lost the Current Wars to AC back in the 1890s, but more than 100 years later some customers still were using DC power from the grid. Could IPv4 last as long?
More than 300,000 IP addresses, nearly 70,000 of them in the U.S., are being directed to servers that will go offline July 9. Computers at two federal agencies are still infected.