Leaders at the World Economic Forum in Davos moved cybersecurity higher on their agenda, but threats will only worsen without users who understand the tools and tactics of a sound cybersecurity defense.
Big data, mobile and hybrid cloud technologies are creating challenging security environments for which half of organizations in a recent study had no disaster recovery plan.
A federal initiative to help departments purchase 50,000 body cameras for police in the wake of recent high-profile incidents of police violence is only the first step in creating a full video system. Departments will have to store and manage terabytes of data for years, sometimes decades.
The new level of advanced persistent threats – some lasting for a decade or more – calls for agencies to extend their defensive measures to cover threats to partners well outside the enterprise.
The VA has been dinged – again – by the GAO because of incomplete follow-through in its cybersecurity operations, showing that it takes more than mere box-checking to make regulators happy.
A recent survey claims that most, if not all, of the rise in sophisticated, targeted attacks from the outside is due to exploitation of privileged accounts.
NIST’s cloud computing roadmap recommends actions to ensure that cloud computing offerings meet the security needs of government as well as the requirements of multiple tenants.
With as much as 90 percent of the code used for in-house development is based on pre-fabricated modules, we need better tools that scan components for potential vulnerabilities before they are tied into actual products.
When online health insurance exchanges failed to perform as expected during the Affordable Care Act’s first open enrollment period, call centers became a vital backup. How will things roll in the upcoming OE2?
Android Lollipop and iOS8 present government mobility managers with more options for balancing end-user convenience with the requirements of high-threat, classified environments.