Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
IPv6, known to some as the new Internet, is architected to be safer than IPv4, but that doesn't mean organizations shouldn't take steps to assure the security in Internet Protocol version 6, American Registry for Internet Numbers' John Curran says.
While Microsoft's move to take down Zeus malware-related botnets is touted as a unique approach to fight financial fraud, some industry experts question its long-term viability. What are their concerns?
Legislation being drafted by an influential Republican House chairman to reform the Federal Information Security Management Act could, if enacted, reverse Obama administration policy on how IT security is governed in the federal government.
The Defense Department will employ a two-prong approach - securing the perimeter as well as the data - as it develops its cloud-computing architecture. "We're going to be able to better protect as we get more standardized," CIO Teresa Takai says.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.