Soldiers can now access the Army Training Network using smart phones and computer tablets -- with just a username and password.
IBM’s cloud-based X-Force Exchange fosters sharing of cyber threat intelligence among contributing organizations.
As mobile devices proliferate and the cloud becomes the primary way of delivering apps and services, the former hard edge of the network is becoming much fuzzier.
Human error is the leading cause of data breaches, a new report reiterates, so early detection should be IT managers' top priority.
Complexity, cost and ROI all have a part to play in security acquisitions, but it only takes one to derail a program's implementation.
Researchers at Yahoo have developed a biometric authentication system that uses the whole touchscreen as the image sensor and verifies biometrics with low-resolution scans.
In order to prevent system failure, minimize the loss and prevent the next breach, agencies need an incident response plan that includes forensic investigation.
By examining the entire IT infrastructure, security teams can determine how best to assign controls and centralize tasks.
Budget constraints and concerns about network performance rank at the top of federal IT decision makers’ lists of why data is not properly encrypted.
A new paper details the many vulnerabilities in common city systems and suggests steps for beefing up defenses.
Rapid growth and adoption of cloud services increases demand for demonstrable cloud security expertise.
The Government Accountability Office report surfaces the cybersecurity challenges inherent in the FAA’s air traffic control network modernization process.
The report, among other things, “demonstrates the need for all those stinking patches on all your stinking systems.”
The annual Cyber Defense Exercise pits service academy teams against NSA experts in an attempt to teach real-world network defense skills.