Malware innovators are evading automated analysis, forcing agencies to secure virtual machines and networks as completely as other classic IT.
The presidential directive mandating interoperable smart government ID cards is 10 years old this month, and represents an impressive effort to specify and implement the technology. Now we need to put it to use.
Samsung’s Knox containerization technology, together with sophisticated vetting in defense and security circles, is gaining traction in federal, state and local markets.
A new IT policy letter from the GSA’s CIO aims to ensure that the agency’s senior security officer is a part of all IT projects, not just brought in after the fact to monitor compliance.
Maintaining effective cyberthreat defenses not only requires constant vigilance but also an eye on the road ahead.
The increasing complexity and sophistication of cyberthreats is driving the use of automation in cybersecurity. Where does human intelligence fit in the picture?
Can the standard agency develop effective cryptographic and cybersecurity standards without the help of the National Security Agency?
It can take seven months or more to migrate to a new server operating system, so Microsoft's July 2015 cut-off date for Windows Server 2003 support really is just around the corner.
How can government best position itself against cyberattacks, which seem to be increasing both in number and sophistication?
Although the federal government is trying to encourage telework, a new survey shows agencies are losing workers because of a lack of telework opportunities at a time when a shortage of cybersecurity professionals is being called a threat to national security.