A recent study offered 10 recommendations for bolstering cybersecurity of commonly used embedded systems.
A new study details which Top-Level Domains are saturated with suspicious websites.
The Department of Homeland Security released its vision for how enhanced biometrics capabilities will transform the agency’s operations over the next 10 years.
The agency's Bureau of Reclamation announced a one-year limited-source award to Microsoft reseller New Tech to support 100 licenses of Windows Server 2003.
Employees who use personal devices outside agency parameters expose agency networks to hosts of mobile malware.
Joining other cloud providers, Google hands customers the encryption keys. But is this the best way to keep agency data safe?
The state's Department of Transportation is testing mobile driver license software with employees who will assess and validate the solution.
The company’s Embedded Critical Systems Protection locks down the software embedded in the devices to protect against zero-day attacks and prevent compromise.
The Defense Advanced Research Projects Agency’s XD3 program is looking for innovative ways to mitigate and minimize the effects of DDoS attacks on networks.
Trusted computing can help agencies manage geographically dispersed servers and emerging OpenStack deployments.
The Iowa Communications Network now has a way to visually track real-time network and information system disruptions and cyberattacks.
Automated management, monitoring and security tools – along with common-sense policies – can help agencies gain the upper hand against shadow IT.
Least-privilege access and continuous monitoring of employees can help enterprises curtail insider threats.
When evaluating and updating cybersecurity defenses, agencies should begin by considering these five underlying principles.