Frequent, mandatory password changes are not only unnecessary but may in fact be harmful to security, according to studies on the subject.
Instead of looking for the technical attributes of known malware and other exploits, IT managers can quickly and accurately detect active attackers by the things they must do on an unfamiliar network to accomplish their objective.
A recent demonstration tested the viability of using an SDP front end to provide the access between various compute resources located across multiple public clouds.
Migrating to the stronger encryption now will ensure agencies that process credit card payments can continue to conduct business, serve taxpayers and bring in revenue.
Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.
Gen. Michael Hayden, the former director of the National Security Agency and CIA, said the nation has hardly begun the cybersecurity conversation about what should be open and what should be protected.
The Department of Homeland Security is looking for a series of automated and secure-by-design tools for mobile apps that assist developers, analysts and security or network operators.
Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.
Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.
Celebrating discovery and innovation in government IT.
A new report explores the potential ways the technology behind Bitcoin could help USPS reinvent its mission.
As experts warn of the threats posed by outdated federal technology, lawmakers inch closer to backing a $3.1 billion fix-it fund.
State officials tell Congress on how they are preparing for (and responding to) cyberattacks.
Naval Air Systems Command issued a broad agency announcement for research to ensure weapon systems can survive and exploit cyber warfare.