Can mobile devices work as ID cards, thin clients on a secure net?
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
DISA wants software that would let DOD personnel securely use smart phones and tablets on DOD networks.
DOE is using a cloud-based appliance to handle encryption of unclassified e-mail, but the solution is not for everybody.
Although PIV cards are intended to be a standard source for PKI certificates, legacy hardware and software and the emergence of mobile devices have led DOE to adopt a gateway encryption appliance for secure e-mail.
Communication, data sharing and application development will play a key role for city governments over the next five years, according to Pike Research.
The group's report can help states use their digital infrastructure to securely conduct business with other states, organizations and the public.
GAO report on mobile threats concludes that certain agencies, and all users, can help improve security.
NIST’s new risk assessment guidelines caps planned efforts of a multiagency task force, but federal cybersecurity is just entering its new phase.
Most federal officials questioned in a recent survey said that requirements for continuous monitoring of security status have not reduced risk in the IT systems.
A team at the Idaho National Laboratory spent three years developing the software sentry, which monitors industrial networks for any suspicious activity.
The company said it will issue a cumulative patch Friday for a vulnerability that had prompted some security experts to urge IE users to switch browsers.