A recent panel focused on government’s role in managing the risks associated with the Internet of Things.
By including security in all aspects of development and operations processes, agencies can move from a reactive to a proactive security posture.
It may be too soon to tell, but predictive analytics offers agencies hope that they can get ahead of the threat rather than just cleaning up after the fact.
A new report shows nearly 60 percent of respondents believe that their agency currently struggles to understand how cyberattackers can breach their systems.
Next-generation breach detection marries big-data and machine learning to deep cybersecurity expertise to maximize defense against breaches and threats.
Workspace-as-a-service platforms that incorporate desktop virtualization features are among the latest technologies to support the burgeoning government mobile workforce.
An inspector general audit reveals vulnerabilities in servers, outdated operating systems and physical and security deficiencies in the Transportation Security Administration system that connects airport security systems to central TSA servers.
Watson for Cyber Security will leverage the platform’s natural language processing to provide insight to threats.
A hybrid approach to network modernization can be cost-effective for agencies and deliver real improvements in capacity, availability and security.
Agencies are responsible for three broad areas of compliance: user management, privacy and training.
Establishing the right technology ecosystem can address agencies’ data security challenges, including how and where to store data and control access.
The cybersecurity review examines the DODIN from an adversary’s perspective to better prepare network defenders.
The National Institute of Standards and Technology is calling on the public to help it map out new guidelines for federal agencies' digital authentication practices.
HID Global’s goID platform lets government agencies issue identity credentials over the air to users’ smartphones, from which they can transfer relevant ID data to requestors.