By better understanding how cyberattacks work and applying that knowledge appropriately, organizations can better prepare for inevitable hacks.
The National Geospatial Intelligence Agency is looking for capabilities to bolster authentication and track activity across its virtual networks.
Unlike perimeter-based security, virtualized network security allows for segmenting the data center, firewalling off various sensitive areas without the need for external hardware.
Open source technologies combine distributed peer review and transparency, which speeds innovation and lowers costs.
The Rhode Island Cybersecurity Commission evaluated the state's cybersecurity infrastructure and made recommendations to enhance the resiliency of operations in executive branch agencies.
NASCIO's latest poll of state CIOs explores a wide range of IT problems and priorities.
State and local governments are balancing privacy, security and citizen service as the amount of available data explodes -- and finding that policy needs to catch up with the tech.
U.S. Postal Service's Office of the Inspector General sent phishing emails of its own to 3,125 USPS employees, to see if staff would click on a potentially dangerous link.
The recent Government Accountability Office’s report indicates that government seems to be backsliding on many of its commitments to IT security.
With encrypted file transfer, city departments can quickly and efficiently process requests involving sensitive information.
If the discussion involves information security, NIST’s technology fellow is almost certainly shaping it.
Officials described the increased focus on cybersecurity and cyber defense at the semi-annual Network Integration Evaluation.
STARTTLS, a common method for encrypting email in transit, does not protect against other major security concerns and is not the only option within the federal government.
By addressing issues of data governance and social responsibility, agencies can rebuild the public trust lost in recent security breaches.