A team of researchers at the Hanscom Air Force Base has developed a process for delivering solutions that protect against insider threats.
Secure browsing topped a list of the most activated mobile applications in the last year, according to a report by enterprise mobile management firm Good Technology.
Dell unveiled a new version of its Cloud Access Manager, an access management tool that taps a new security analytics engine to streamline access to web applications and OpenID Connect-compliant mobile apps.
While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.
Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.
The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.
Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.
The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.
A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.
The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.
DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.
A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.
An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.
U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.