To make the next hack of a federal agency less devastating, the Continuous Diagnostics and Mitigation and Einstein programs need complementary data protection tools.
Is overconfidence by IT security managers a bigger problem than technology challenges?
With the average public sector employee using more than 16 cloud services, a new study finds, the impact of one compromised account can be immense.
Analysis of recent sophisticated cyberattacks has revealed four common characteristics that help provide a clearer and more useful definition for cyber weapons.
New Jersey is the latest state to establish an information-sharing unit, while several other states are trying different tactics.
The framework will help agencies calculate the privacy risk for their IT systems.
According to a recent survey by 2nd Watch, security tools were the most popular third-party purchase for Amazon cloud deployments.
Six nines of uptime is certainly achievable with a little bit of simplification and planning -- and a whole lot of technology and teamwork.
Newly developed password manager software aims to deter hackers by surrounding the real passwords with convincing fakes.
New Microsoft cloud efforts aim to further secure and protect customer data, while increasing transparency about the security.
The technology lets users unlock devices based on the patterns of their swipe on a touchscreen.
Veteran’s Affairs monthly security activities report shows an increase in attacks, but no data compromised.
Cybersecurity experts from industry and government discuss network defense, cyberwar doctrine and how the Internet of Things is expanding the attack surface.
New studies show just how rapidly the threats are growing -- yet government is still wrestling with basic cyber hygiene.