The company has released a patch that fixes the flaws that could give hackers access to private information.
Universities will get help commercializing the technology developed under a $12.2 million Department of Energy pilot program to protect the nation's energy infrastructure.
Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.
With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.
Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.
Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.
Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.
Could future breaches stem from such non-obvious sources as police body cameras or device components?
The Internet is a dangerous place. But there are concrete steps an organization can take to manage the risk while still allowing employees the access they need.
The Pell Center’s report on the cyber readiness of eight states explores how states are protecting infrastructure, information and operations.
Pacemakers and other devices have Internet capabilities, but all too often lack adequate security.
No matter where information is located -- on the network or a personal computer -- multiple layers of security must be in place to keep threats at bay.
Interest in the DHS-run Continuous Diagnostics and Mitigation program has been slow to build outside of federal agencies, but other levels of government are beginning to take note.
Staffing alone can't solve agencies' health IT challenges, but the right workforce is absolutely critical -- and there are ways to build it more effectively.