The new report on the breaches at the Office of Personnel Management presents a template for how to design security to prevent future intrusions.
A recently announced partnership between MobileIron and Entrust Datacard aims to deliver a derived credential solution by the end of the year.
Today’s mobile IT environment -- with all of the issues bring-your-own-device policies and shadow IT mobile bring with it -- represents a starkly different world to secure and manage.
The National Institute of Standards and Technology’s reference design would improve interoperability between mobile platforms, applications and identity systems for public safety organizations.
Protecting the infrastructure from attack will require a new way of thinking about critical systems cybersecurity.
Now that hackers use apps as a front end for their attacks, ‘benign’ no longer means what you think it does.
The Pentagon's recent pilot program shows just how pervasive the exploitable network vulnerabilities are.
A recent demonstration tested the viability of using an SDP front end to provide the access between various compute resources located across multiple public clouds.
It may be too soon to tell, but predictive analytics offers agencies hope that they can get ahead of the threat rather than just cleaning up after the fact.
Because the effort to pull together any kind of quantum-resistant cryptography will be lengthy and complex, the process must start now if those trusted cryptosystems are to be developed in time.