Peripherals that use unencrypted radio signals to communicate can create vulnerabilities for enterprises.
A new study finds that public sector organizations in the United States are targets in a vast majority of attacks.
According to DOD Deputy CIO Richard Hale, the department is seeking to weave cybersecurity duties into virtually every job description.
Overlooking or underestimating issues in business continuity planning can add insult to injury when disaster finally occurs.
If the county-owned phone used by San Bernadino shooter Syed Farook had been enrolled in the agency’s mobile device management program, the FBI-Apple standoff might have been moot.
To ensure its IT systems can successfully operate in a contested cyber environment, the Navy has finalized eight cybersecurity standards that aim to provide a uniform security architecture.
While most cybersecurity strategies primarily address limiting the possibility of attack, organizations must assume their systems will be compromised and deploy a strategy to isolate and collapse affected network cells.
MorphoTrust’s automated biometric identification system helps warfighters on the ground verify identities with a search engine that registers and compares biometric features against data on file.
U.S. CIO Tony Scott said securing shared networks and applications will help maintain network resiliency.
States are working to try to stop online filing fraud by verifying the identity of the filers, strengthening password protocols and sharing information on filings that use stolen identities.
Software-defined systems could prove the best way to tackle the security problems that otherwise threaten to overwhelm government.
The Cybersecurity National Action Plan has potential -- but now we must encourage mass-scale commitment.
The General Services Administration is weaving cybersecurity into the fabric of its next-generation telecommunications contract.
A new bill would preempt states from making their own laws regarding access to encrypted communications.