Booz Allen Hamilton will be working with Microsoft to develop a single dockable product that workers can use like a desktop or or mobile device without losing any compute power or security.
As incidents of ransomware increase, states should eliminate easy targets and patch systems.
As agencies migrate their voice networks to internet-based platforms, session border controllers can provide additional security in unified communications.
Unlike antivirus protection, which only identifies specific signatures, advanced endpoint security provides real-time analysis of file movement and behavior across a whole network.
As the scope and sophistication of cyberattacks continue to grow, agencies are deploying ever more innovative defenses.
Although there are inherent risks to increasing the number of personal mobile devices connected to government networks, the benefits are too good to ignore.
Department of Homeland Security Secretary Jeh Johnson is conferring with state and local governments about the cybersecurity of voting systems.
Thirteen companies received $1.3 million in funding to develop new cybersecurity measures and technologies.
In a Black Hat presentation, a security consultant explained how existing EMS solutions could often be ineffective, even on standard, non-jailbroken personal devices.
The Intelligence Community's research agency is exploring the use of role-based virtual environments to enhance security.
Recipients of the Cybersecurity Public Service Scholarship Program must work for the state after graduation for the number of years that they received the scholarship.
Rather than focus on attacks from the outside, organizations should concentrate on the internal networks, data and risks within their control.