BALTIMORE – Defense agencies could see a slew of new capabilities designed to ease identity and access management this year, according to defense IT officials. Chief among them is an expansion of ...
DataLocker, Inc., a leader in hardware-encrypted data protection, today announced that its flagship Sentry 5 encrypted USB ...
A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...
The Air Force is looking for innovative ways to secure smartphones and tablets, under a four-year, $24 million program to make authentication, data transmission, storage and other functions on mobile ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
Certificate-based authentication is a cryptographic technique that allows one computer to securely identify itself to another across a network connection, using a document called a public-key ...