When evaluating and updating cybersecurity defenses, agencies should begin by considering these five underlying principles.
Government and industry are developing increasingly sophisticated tools to see beyond the smoke screen of fraudulent claims for medical payments.
CellShield discovers patterns, bulk-protects and audits personally identifiable information in spreadsheets.
Intellicheck is piloting its Law ID mobile device-based authentication solution with three different law enforcement agencies.
The Biometric Technology Center will support ongoing collaboration between the FBI’s Biometric Center of Excellence and the Department of Defense’s Forensics and Biometrics Agency.
The Department of Homeland Security has accredited Lockheed Martin as a Commercial Service Provider under the department’s Enhanced Cybersecurity Services.
Multifunction printers are susceptible to the same security vulnerabilities computers are, so agencies must incorporate these devices into their information security plans.
Facial recognition is emerging as an authentication method more accurate than passwords – but how do these systems work?
The Scrambl3 app creates a secure virtual-private network that connects BYOD smartphones to an agency server to send messages with end-to-end encryption.
NIST calls the new standard, which is based on an instance of the KECCAK algorithm, “a next-generation tool for securing the integrity of electronic information.”
When considering a private cloud in health care, be sure to conduct ample research, develop a solid risk management policy and ensure that business objectives are met.
The Defense Information Systems Agency recently released a new draft of security standards as the Defense Department moves to a cloud environment.
The security features should help the desktop OS stay relevant and make the mobile ecosystem more like iOS or Android.