With proactive, appropriate security controls, IT managers can secure their networks, save administrative time and deliver a flexible, personalized environment for users.
While it is virtually impossible to know when cybercriminals will attack, taking certain preventative actions before an attack can certainly reduce the risk of damage.
A researcher presenting at the RSA Security Conference said he can hack and hijack a popular drone model via two separate system vulnerabilities.
With the Hack the Pentagon program, the Defense Department is inviting vetted hackers to expose potential vulnerabilities.
The Unisys Stealth security software solution is close to approval for NSA’s Commercial Solutions for Classified Program Components List -- clearing the way for use on classified networks.
A survey of federal IT managers shows the biggest cybersecurity challenges agencies face.
Lewis Rhodes Labs has a neuromorphic processor that increases the speed and resolution of anomaly detection by more than 100-fold
According to recent budget documents, the Navy is asking for $88 million in research and development associated with cyber resiliency.
Whether the card allows for access into a government building or another country, new technologies are making it easier for officials to verify identities.
Conflicting messages over mobile devices security sow doubt and confusion.
The research agency underwrites a project to help document a system's effectiveness at protecting user data.
Peripherals that use unencrypted radio signals to communicate can create vulnerabilities for enterprises.
A new study finds that public sector organizations in the United States are targets in a vast majority of attacks.
According to DOD Deputy CIO Richard Hale, the department is seeking to weave cybersecurity duties into virtually every job description.