Budget constraints and concerns about network performance rank at the top of federal IT decision makers’ lists of why data is not properly encrypted.
A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.
Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.
The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.
The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”
The annual Cyber Defense Exercise pits service academy teams against NSA experts in an attempt to teach real-world network defense skills.
The platform corroborates actual endpoint behavior with third-party data to help capture, analyze and remove malicious activity before it compromises resources.
A new NASCIO study details state governments' struggles to recruit and retain IT talent.
Security researchers say they’ve uncovered a new technique for stealing login credentials from any Windows device, but Microsoft says it addressed the issue in 2009.
The iboss FireSphere Threat Isolator integrates the company’s advanced persistent threat solution with HP’s software-defined networking architecture.
According to a recent RFI, the Army will be ending its support contract with Microsoft but wants to ensure it can still avoid security vulnerabilities on its 8,000 Microsoft Windows XP devices.
Some solid password advice from an unexpected source.
The research agency’s BRASS program aims to ensure that applications can continue to function in a rapidly changing technology ecosystem.
Beebone, or AAEH, allows multiple forms of malware to compromise security on a wide range of operating systems.