To address the challenges inherent in password-based security, the U.K. government is taking a different tack -- encouraging its systems administrators to simplify their approach to passwords and use automated controls.
Army researchers are working on an algorithm that will help system administrators improve security by more easily identifying malware authors and tracking the origin of threats
The Defense Department will no long accept the driver’s licenses or state-issued identification from Illinois, Minnesota, Missouri, New Mexico, Washington and American Samoa for entrance to its facilities.
The solution was designed to provide advanced security to AWS customers while giving Unisys clients ease of access and scale of the AWS cloud.
The 2016 Cyber Security Division R&D Showcase and Technical Workshop will highlight the status of the latest cybersecurity research, enable collaboration among the researchers and government agencies and connect the technologies to transition partners.
The zero-day vulnerability allows Android or Linux applications to escalate privileges and gain root access.
The National Association of State Chief Information Officers named cybersecurity the top item in its advocacy agenda.
Warning flags have been raised over SSH, which helps manage servers, routers and firewalls and is used to provide privileged access to servers and networks.
Galois has been awarded a $1.7 million contract from the Department of Homeland Security for a peer-to-peer collaboration technology that allows organizations to work together to detect and mitigate distributed denial of service attacks.
Officials from the Defense Information Systems Agency discussed the capabilities it requires for network security.
Attacks on the domain name systems are on the rise and can cripple an agency’s network.
The federal government is backing off its demand that states bring their driver’s licenses and state ID cards to federal standards or see their residents face greater hassles at airports.
Juniper Networks responded to the finding of “unauthorized code” in its firewall operating system with a complete replacement of its original controversial random number generator, Dual_EC.
Agency IT managers who believe they do not have the resources to adequately fight cybersecurity threats got some backing from private-sector experts who voiced the same concerns to legislators.