Through a recently issued broad agency announcement, the Air Force is seeking to address kill chain integration and full spectrum awareness of emerging threats.
It’s no use having good endpoint security if the behavior of the users negates that.
Public- and private-sector officials discuss cybersecurity workforce issues at the inaugural Commonwealth Conference on Cyber and Education.
Individual users, small agencies and large enterprises can all contribute to raising the bar for cyber protection, making it more difficult and more expensive for cyber criminals to achieve their objectives.
The Department of Homeland Security's National Cybersecurity Assessment and Technical Services can help governments at all levels learn how their networks look to would-be attackers.
After evaluating over 30 million alerts from its users around the world, Sentinel IPS found that 67 percent of government networks and 72 percent of education networks triggered critical malware or ransomware alerts.
A shift towards software-defined security can deliver improvements in automation, virtualization and a holistic security architecture.
The company has released a patch that fixes the flaws that could give hackers access to private information.
Universities will get help commercializing the technology developed under a $12.2 million Department of Energy pilot program to protect the nation's energy infrastructure.
Just managing the device is no longer an option. Here's where the experts see mobile-security strategies heading in 2016 and beyond.
With funding from the National Strategy for Trusted Identities in Cyberspace, the pilots address barriers to the identity ecosystem and seed the marketplace with “NSTIC-aligned” solutions to enhance privacy, security and convenience in online transactions.
Although recent data breaches may indicate that computer security is harder than putting a man on the moon, the government can improve its cyber posture.
Recent surveys of government IT managers show increasing hand wringing when it comes to legacy systems.
Identifying and dealing with potential issues before they become problematic should be the primary goal of every agency’s IT team.