Digital identity management technology allows devices to securely recognize and interact with each other, improving the quality of civic services and city planning.
A recent report by the Brennan Center for Justice found that 43 states are using voting machines that will be at least 10 years old by November 2016 -- raising the risk for Election Day delays, lost ballots and worse.
The latest release of Jetico's hard drive wiping software, BCWipe Total WipeOut, includes central management for both wiping and reporting remotely over a network.
A panel of cybersecurity experts explore the lessons learned from the breach and how Defense agencies can best defend their networks.
The Defense Advanced Research Projects Agency recently awarded Raytheon BBN a contract to research ways to optimize and protect information flow over wide-area networks.
Two more examples -- from Boston and the Transportation Security Administration -- of how one misstep can compromise an entire system.
The new components of Unisys Stealth are based on a software design that eliminates operational costs associated with additional hardware and cuts deployment times by up to half.
Are spear phishing awareness and cyber hygiene training just one more compliance box for agencies to check?
Lack of awareness about context-aware security was the top barrier to implementation and adoption, according to a recent survey.
The XDet system associates a single block of data with a file and creates reference points within that block as a signature.
The department's Science and Technology Directorate has licensed the PathScan network anomaly detection tool to Ernst & Young.
The State Department is looking for a set of how-to guides for handling, blocking and responding to cyberattacks.
Virginia Gov. Terry McAuliffe wants his IT team to conduct a full cybersecurity audit and craft new strategies for preventing attacks on state networks.
After establishing a baseline level of trust, subsequent decisions regarding access should factor in the context of that decision and the value of the resource being requested.