The new components of Unisys Stealth are based on a software design that eliminates operational costs associated with additional hardware and cuts deployment times by up to half.
Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?
Lack of awareness about context-aware security was the top barrier to implementation and adoption, according to a recent survey.
The XDet system associates a single block of data with a file and creates reference points within that block as a signature.
The department's Science and Technology Directorate has licensed the PathScan network anomaly detection tool to Ernst & Young.
The State Department is looking for a set of how-to guides for handling, blocking and responding to cyberattacks.
Virginia Gov. Terry McAuliffe wants his IT team to conduct a full cybersecurity audit and craft new strategies for preventing attacks on state networks.
After establishing a baseline level of trust, subsequent decisions regarding access should factor in the context of that decision and the value of the resource being requested.
A recent study offered 10 recommendations for bolstering cybersecurity of commonly used embedded systems.
A new study details which Top-Level Domains are saturated with suspicious websites.
The Department of Homeland Security released its vision for how enhanced biometrics capabilities will transform the agency’s operations over the next 10 years.
The agency's Bureau of Reclamation announced a one-year limited-source award to Microsoft reseller New Tech to support 100 licenses of Windows Server 2003.
Employees who use personal devices outside agency parameters expose agency networks to hosts of mobile malware.
Joining other cloud providers, Google hands customers the encryption keys. But is this the best way to keep agency data safe?