Comprehensive IAM focused on authentication, authorization, administration and auditing is critical to keeping government information safe.
The Defense Department's common access card will continue to be a major component of the Pentagon's evolving identity management strategy, DOD CIO Dana Deasy said.
Paper ballots should be required in all states by the 2020 presidential election, according to new report.
A new report digs into the behavior and strategies that guide botnet-directed campaigns.
A unified endpoint management service can make security invisible to the user and help agencies minimize security incidents.
The Q-RAND random-number generator takes advantage of the unpredictable behavior of subatomic particles and can be inexpensively embedded in electronic devices like USB sticks.
Researchers have developed an algorithm that can detect and correct anomalous GPS timing signals.
The map offers a bird’s eye view of the cyber battlefield and access to the National Security Archive's extensive collection of Cyber Vault documents.
The Office of Elections Cybersecurity is dedicated to limiting incidents that could interfere with the security or integrity of elections in the state.
Agreement on data handling practices combined with advanced technologies can create a trusted threat intel sharing environment between the U.S. and its European allies.