Two-stage DIA protocol preps documents to move at 'moment's notice' across separate security domains.
Wholesale migrations aren't expected soon, but IT managers say there are several ways the new OS could start slipping in through the side doors.
An innovative cryptographic scheme does away with trusted third parties to protect stored and scrambled passwords on separate servers.
Sandia Labs’ virtual Android network is part of a larger project to emulate large-scale networks to help understand and defend complex online environments.
Using NIST's Security Content Automation Protocol in tandem with TCG's Trusted Network Connect architecture provides the benefits of two open standards to improve endpoint security.
The government has specified a series of vetted cryptographic algorithms that can be used to verify the authenticity of documents and digital signatures. Here's how they do it.
The winner of the five-year competition -- called Keccak -- will be a candidate for the new federal SHA-3 standard, but NIST scientists say it is not a replacement for SHA-2, which has held up better than expected.
For agencies that need secure voice over IP communications, Belkin has introduced a switch that offers certralized control over audio ports.
Microsoft has reached a settlement with the operators of the 3322.org domain in China to “sinkhole” traffic to 70,000 malicious subdomains.
What do IT leaders have confidence in? Not government regulations, exit strategies or data privacy, according to a new survey.
A team from Indiana University frames PlaceRaider as a potential tool for burglars, but what if it got into government buildings?
Groovy, a subset of Java, is so easy to work with it, it could one day replace the ubiquitous programming language.
A new report from FireEye details the dominant current trend in phishing, and the most common words and file attachments used in malicious e-mails.
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
Mobility is key for unlocking productivity, but government still struggles to securely manage mobile devices and their data, agency IT leaders say.