Integrating automation into network defenses will become increasingly important as threats become more sophisticated and diverse.
A new survey shows a significant decline over the past two years in federal employees’ trust in their agency’s ability to protect information systems.
The mBeaconCard identity card enables wireless tracking and contactless applications, such as access control, payments processing and workforce analytics.
Celebrating discovery and innovation in government IT.
A bill in New York calls for a device that can field-test electronic devices after an accident for proof of their unlawful use while driving.
The Compliance Masonry platform lets users actively interact, update and generate assurance reports for any type of risk management framework.
A new report finds that government agencies at all levels ranked dead last in cybersecurity against major private industries.
A panel of chief information security officers discussed how they make employees part of the agency’s cybersecurity defense.
Inconsistent application of agencywide security controls puts taxpayer information at risk, the Government Accountability Office said.
Rep. Will Hurd (R-Texas) says a reorganized "cyber infrastructure protection" division could serve as a valuable resource and central point of contact.
MobileIron Access helps secure cloud data accessed through commonly commercial apps on mobile devices.
The FBI believes at least one group of hackers has been using APTs against government agencies for at least the past five years -- and possibly much longer.
A backend attribute exchange streamlines identity management by keeping users' security credentials on local systems but making them accessible from other network locations.
The cloud threat funnel methodology can help agencies uncover the user behavior patterns that lead to legitimate threats.