A recent survey claims that most, if not all, of the rise in sophisticated, targeted attacks from the outside is due to exploitation of privileged accounts.
Entrust Datacard released a console that lets agencies produce a single unified identity credential for each person associated with an agency, delivered as a service.
Dell and CGI announced a joint venture to offer virtual desktop, business analytics and identity management services to government and enterprise customers.
Unauthorized software not only increases the attack surface for adversaries, but it also hampers IT managers’ ability to fully secure their assets. Here are eight ways to get unauthorized software under control.
A partnership between Microsoft and VIEVU, a manufacturer of police body cameras, will let officers transfer their videos to Microsoft’s soon-to-be-released Azure Government Cloud.
NIST’s cloud computing roadmap recommends actions to ensure that cloud computing offerings meet the security needs of government as well as the requirements of multiple tenants.
The National Institute of Standards and Technology’s guide will help agencies evaluate commercial mobile applications that agency workers might use on government-issued devices or personal apps that access government networks.
Introducing open source code doesn’t have to be an intimidating process. But ensuring security is key.
The Homeland Security Department calls for information on emerging technologies that would help government keep up with the latest developments in biometric matching.
With as much as 90 percent of the code used for in-house development is based on pre-fabricated modules, we need better tools that scan components for potential vulnerabilities before they are tied into actual products.
Mitre Corp. cybersecurity engineer Carson Zimmerman spells out ways government security operations centers can regain advantages against increasingly sophisticated adversaries.
Cybersecurity provider Centripetal Networks partners with ThreatTrack to enhance its RuleGate attack visualization tools.
The Navy has been able to troubleshoot and repair programming errors before software is deployed using HP’s Fortify Software Security Center product.
National Institute of Standards and Technology, University of Maryland and National Security Agency have formed a new center for quantum computing science.