According to a recent RFI, the Army will be ending its support contract with Microsoft but wants to ensure it can still avoid security vulnerabilities on its 8,000 Microsoft Windows XP devices.
Some solid password advice from an unexpected source.
The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.
Beebone, or AAEH, allows multiple forms of malware to compromise security on a wide range of operating systems.
An upgrade to a chip-and-PIN cards for Social Security, Medicare and employment verification would enhance personal privacy, secure identities and prevent fraud.
Agencies need to protect systems from software vulnerabilities that compromise availability, integrity and security.
New guidance from the Smart Card Alliance could speed and standardize procurements of physical access control systems.
Providing end-to-end 10 gigbit/sec throughput speed, General Dynamics Mission Systems' TACLANE-10G secures information classified Top Secret and below over government and commercial networks.
The Center for Internet Security’s Amazon Machine Images will enable organizations to reduce time, cost and risk in their cloud deployments.
Though we may be years away from significant adoption, it’s important for government agencies to begin incorporating wearables into their security planning now.
Even though Hillary Clinton deleted her email, experts can probably recover it.
Air-gapped systems, thought to be the most secure because of their isolation, have newly discovered vulnerabilities.
Identity must be the foundation for future security platforms because traditional network, data and systems protections are of limited use against today's sophisticated cyber criminals.
Suggestions for tech-based solutions for voting and elections may sound practical, but they are certain security hazards.