3 free tools to help manage your passwords
Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.
Effective security requires managing passwords, which can be a daunting job. Fortunately, help is available.
As more of our life moves online we still are looking for an identity management scheme that is practical, secure and scalable. Don't hold your breath.
DOD aims to move the department's network applications from a "duplicative, cumbersome and costly set of application silos" to an environment offering greater agility and cost-effectiveness.
GAO examined seven agencies that have successfully aligned their cloud adoption efforts with the cloud-first policy and found seven challenges common to cloud implementations.
State's Systems and Integration Office has made a strong effort to promulgate a mission statement and a set of goals, but lacks adequate controls and procedures to monitor its multi-year contracts, IG report says.
SAS Security Intelligence platform uses a common infrastructure to detect and prevent threats across government agencies and industry.
Proposed changes in FIPS 201 reflect changes in the technology and environment in which the federal PIV cards for government workers and contractors are used.
NIST's revised guidance sharpens the focus of the original publication, released in 2008, excluding laptops and low-end cell phones, and covering both enterprise-issued devices and BYOD.
The patch for the XML Core Services flaw doesn't yet cover every version, but it does cover the version being attacked.
The National Security Agency chief wants network-speed info sharing with the private sector to protect critical infrastructure, but insists NSA won't have time to read your e-mail.