Most of today’s encryption efforts focus on data stored on servers because that is where the majority of big breaches take place.
The obstacles are daunting -- money, time, careless users, encryption-resistant legacy systems. But the risks are no less serious.
Absolute’s Endpoint Data Discovery allows organizations to identify and protect sensitive data stored on endpoint devices outside the enterprise network.
To counter the pace of cyberattacks, the new Air Force Cyber Proving Ground aims to rapidly get cyber tools to operators.
The future of authentication could start with mobile devices and apps that track user location and behavior, DISA Director Lt. Gen. Alan Lynn said.
Agencies that focus on a governance-based identity and access management strategy can protect against the full range of identity-centered attacks.
During a recent panel discussion, Pentagon officials pushed back on criticisms that there is lack of clarity on how the Defense Department will respond to domestic cyberattacks.
When neither employers nor workers have confidence in an organization’s ability to protect data, security tools can only provide part of the answer.
Integrating automation into network defenses will become increasingly important as threats become more sophisticated and diverse.
A new survey shows a significant decline over the past two years in federal employees’ trust in their agency’s ability to protect information systems.
The mBeaconCard identity card enables wireless tracking and contactless applications, such as access control, payments processing and workforce analytics.
Celebrating discovery and innovation in government IT.
A bill in New York calls for a device that can field-test electronic devices after an accident for proof of their unlawful use while driving.
The Compliance Masonry platform lets users actively interact, update and generate assurance reports for any type of risk management framework.