Automation can give developers confidence in open-source components’ security, licensing and quality.
Maryland used Virtru Pro to ensure email is encrypted before it’s sent, making it compliant with requirements of the Health Insurance Portability and Accountability Act and Criminal Justice Information Services.
Biometric data capture, ID verification and algorithmic intelligence technologies will enhance the coverage, responsiveness and flexibility of border protection efforts.
Hacks of phone-based fingerprint readers and facial recognition software underscore the need for multifactor identification.
By addressing weaknesses in human factors, agencies can reduce their attack surface and make every employee a soldier in the battle against cyberattacks.
Cities are looking for open and secure solutions to help enable smart city development, according to a new report from IDC.
To highlight the nation's biggest and most urgent cybersecurity issues, a new 100-page report calls for an all-hands-on-deck approach to addressing cyber risks.
McAfee’s annual report on the cybersecurity landscape holds some tips for government IT managers.
Although the new policy only applies to certain websites, it aims to better protect government information by making vulnerability reporting easier.
The Defense Logistics Agency may expand its use of DNA marking technology to verify the authenticity of microchips and other electronics in its supply chain.
The city’s light transit systems were hit with malware that shut down ticketing machines and demanded payment.
To protect the privacy of undocumented New York residents, the mayor said the city could wipe its database of municipal identify cardholders before 2017.
Secure document management minimizes the exposure of sensitive printed, faxed or scanned data to anyone but the personnel who have a “need to know.”
Authentic8's Silo is now configured with DOD's public certificates, allowing for secure authentication of Common Access Card users.