Microsoft browsers perform the best overall in NSS tests of browser-based defenses against socially engineered malware and phishing, but educated users still are the best defense.
Hackers can find their way into the most secure environments through an often overlooked vulnerability: the computer microphone.
A U.K. hacker has been charged with breaching thousands of U.S. networks over the past year, including systems run by the Army, NASA, EPA and other agencies.
The ZBook 15 is a powerful workstation in every way except size and shape.
QKD uses a photon's polarization and spin to verify an unobserved key transmission.
NIST's revised guidance for Smart Grid cybersecurity reflects changes in power grid technology, which will put a lot of personal information on the grid.
Battelle has implemented the first quantum-key distribution system for production use in the United States, but NIST researchers remain skeptical about moving it from the lab to large-scale use.
Seattle's collaboration with the FBI and a DHS fusion center helped thwart attacks from China, but that kind of information sharing doesn't happen enough, a new report says.
A cloud-based Web filtering and policy enforcement service helped the city of Aspen sharply reduce browser infections, but it doesn't replace antivirus protection.
The Cybersecurity Framework will be a living document, and the current version identifies gaps and weaknesses that will be addressed in future iterations.
Outsourcing Domain Name Services and Web policy enforcement to OpenDNS saves the Colorado city and county money while improving security.
A voluntary framework for improving cybersecurity of critical infrastructure is released for comment prior to formal release in February. Based in part on federal standards, it could change the way government regulates industry and procures services.