While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.
Sources of threat information can be found both inside and outside an organization – not just in network monitoring logs and intrusion prevention systems.
The Defense Security Service and the U.S. Senate Sergeant at Arms issued requests for information for services that scan and gather threat information from multiple sources.
Identity systems – and the electronic formats for managing them – have become the top priority for safeguarding the government data attackers now target.
The FAA has taken steps to safeguard national airspace systems, says the Government Accountability Office, but significant vulnerability remains in authorizing user access to systems, maintaining good data encryption and security monitoring practices.
A recently released report from Washington state creates an enterprise-level modernization roadmap to tackle the problem of updating legacy IT systems.
The AG1500FIPS provides enhanced security for SSL traffic by storing, processing and encrypting both the keys and data in a hardware-secured module.
DARPA is using its Memex technology to search, trace and track illicit activity across the vast, hidden underbelly of the Internet.
A new report finds that employees in the average public sector organization actually use 721 cloud services, which is 10 times more than IT departments expect.
An Equation Group threat that uses disk drive firmware to plant malware in systems points to the kind of sophisticated and hard-to-tackle menace that will increasingly be a part of black hat attacks.
U.S. Postal Services is looking for advanced analytics technology to help it detect fraud and conduct sensitive audits.
The guidance covers protecting information processed, stored or transmitted on replication devices, which are those that copy, print or scan documents, images or objects.
The technology built into most smartphones can provide more sophisticated authentication than a paper drivers’ license or passport.
While the Superfish VisualDiscovery spyware found on some Lenovo PCs has damaged the company’s reputation, enterprise customers have been assured that the adware was confined to consumer notebooks.