To ensure your organization is not next in the limelight for all the wrong reasons, the answers to these questions better be the right ones.
By optimizing network performance, IT managers can implement automated, proactive security strategies that will increase network stability and improve the security of the agency.
SecureVue Auditor License offers a portable software solution for Defense Department IT network audits.
The Department of Defense has recently approved derived public key infrastructure credentials on BlackBerry devices.
In an effort to defend against data breaches, the city is investing $3.5 million to develop a firewall that will be operational by the end of the year.
root9B will open a $2 million cybersecurity center to provide remote security services to the company’s government and commercial clients.
While government agencies will always be targets of distributed denial-of-service attacks, they can make themselves less appealing to hackers.
A survey of Black Hat 2015 attendees reveals a disparity between “the threats that keep security professionals awake at night and the tasks that keep them occupied during the day.”
Platform analytics can provide state and local governments with both proactive detection and defensive threat mitigation -- and the information learned can be shared across departments.
Customs and Border Protection will collect fingerprints and passport information and compare it to the same data that was collected when the traveler arrived in the United States.
Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.
The Network Mapping System is the third technology that has successfully gone through DHS’s Transition to Practice program and into the commercial market.
Lessons from a digital-government pioneer on how to think about providing better citizen service.
An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.