The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.
Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.
Illinois center will include more military commands, educational institutions and other federal agencies.
The systems, which can capture up to thousands of images per hour, are increasingly popular with police but are raising privacy conerns.
The Basic Input/Output System that boots a computer could be an attractive target for sophisticated exploits, and the complexity of servers creates specific challenges that NIST addresses in new security guidelines.
NIST offers practical guidance on intrusion detection and prevention systems to help counter the new breed of stealthy, targeted attacks.
DARPA seeks proposals for new software that can scour social media and other sites to predict cyberterrorism events.
With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.
Top state IT leaders have adopted a new strategic plan aimed at putting a stronger emphasis on CIO leadership.
It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.
At Black Hat, Apple's security chief gave a rare look into how the company hardens its iOS operating system.
The Massachusetts Health Insurance Connector Authority is using LexisNexis identity management software to verify the residency information of people participating in the exchange.