The state has improved its security posture by lowering end-user risk and opening communication channels for security concerns.
Agencies can identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.
Although the information that is lifted from government or corporate networks by criminals is a hot commodity on the dark web, tools are being developed to help officials track their stolen data.
Knowing more about organized cybercriminals and the malware marketplace can help IT managers better defend the enterprise, Kaspersky Lab says.
Frequent, mandatory password changes are not only unnecessary but may in fact be harmful to security, according to studies on the subject.
Instead of looking for the technical attributes of known malware and other exploits, IT managers can quickly and accurately detect active attackers by the things they must do on an unfamiliar network to accomplish their objective.
A recent demonstration tested the viability of using an SDP front end to provide the access between various compute resources located across multiple public clouds.
Migrating to the stronger encryption now will ensure agencies that process credit card payments can continue to conduct business, serve taxpayers and bring in revenue.
Security credentials could be based on a primary payment card, a mobile phone or a driver's license -- items users are unlikely to lose or misplace.
Gen. Michael Hayden, the former director of the National Security Agency and CIA, said the nation has hardly begun the cybersecurity conversation about what should be open and what should be protected.
The Department of Homeland Security is looking for a series of automated and secure-by-design tools for mobile apps that assist developers, analysts and security or network operators.
Advances in biometric authentication and smartphone technologies make the marriage of the two a strong platform for identity verification.
Legislators are looking at how government can prepare for and respond to an electromagnetic pulse attack on the U.S. electrical grid.
Celebrating discovery and innovation in government IT.